CVE-2020-11022
mediumCVSS v3 Base Score
6.9
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N
EPSS Score
2.1%
Exploitation probability in 30 days
Top 16% most likely to be exploited
Attack Characteristics
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Confidentiality
High
Integrity
Low
Availability
None
Vulnerability Report
Generated by CyberWatcher
Description
In jQuery starting with 1.12.0 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CWE
CWE-79Affected Products
jquery jquerydrupal drupaldebian debian linuxfedoraproject fedoraoracle agile product lifecycle management for processoracle application testing suiteoracle banking digital experienceoracle blockchain platformoracle communications application session controlleroracle communications billing and revenue management