Solid Lacks Escaping of HTML in JSX Fragments allows for Cross-Site Scripting (XSS)
Description
Published by the National Vulnerability Database
Feb 21, 2025
Published to the GitHub Advisory Database
Feb 25, 2025
Reviewed
Feb 25, 2025
Last updated
Feb 25, 2025
Inserts/JSX expressions inside illegal inlined JSX fragments lacked escaping, allowing user input to be rendered as HTML when put directly inside JSX fragments.
For instance,
?text=<svg/onload=alert(1)>
would trigger XSS here.References