Cross-site Scripting (XSS) Affecting jquery package, versions <1.9.1



    Exploit Maturity Proof of concept
    Attack Complexity Low
    User Interaction Required
Expand this section
Red Hat
5.4 medium
Expand this section
6.1 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JS-JQUERY-569619
  • published 19 May 2020
  • disclosed 19 May 2020
  • credit Robert McLaughlin

How to fix?

Upgrade jquery to version 1.9.1 or higher.


jquery is a package that makes things like HTML document traversal and manipulation, event handling, animation, and Ajax much simpler with an easy-to-use API that works across a multitude of browsers.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). load() fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >" which results in the enclosed script logic to be executed. This can lead to Cross-site Scripting attacks when an attacker has control of the enclosed script.

PoC by Robert McLaughlin


    <script src=""></script>
    <div id="mydiv"></div>
        $("#mydiv").load('inject.html #himom');


<div id="himom"><script>alert('Arbitrary Code Execution');</script ></div>