solid-js is a declarative, efficient, and flexible JavaScript library for building user interfaces. In affected versions Inserts/JSX expressions inside illegal inlined JSX fragments lacked escaping, allowing user input to be rendered as HTML when put directly inside JSX fragments. This issue has been addressed in version 1.9.4 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
                
            Metrics
Affected Vendors & Products
References
        History
                    Mon, 24 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Fri, 21 Feb 2025 21:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | solid-js is a declarative, efficient, and flexible JavaScript library for building user interfaces. In affected versions Inserts/JSX expressions inside illegal inlined JSX fragments lacked escaping, allowing user input to be rendered as HTML when put directly inside JSX fragments. This issue has been addressed in version 1.9.4 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | |
| Title | Lack of Escaping of HTML in JSX Fragments allows for Cross-site Scripting in solid-js | |
| Weaknesses | CWE-116 CWE-79 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-02-21T21:12:58.218Z
Updated: 2025-02-24T17:05:00.409Z
Reserved: 2025-02-18T16:44:48.766Z
Link: CVE-2025-27109
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-02-24T17:04:56.480Z
 NVD
                        NVD
                    Status : Received
Published: 2025-02-21T22:15:14.303
Modified: 2025-02-24T17:15:14.850
Link: CVE-2025-27109
 Redhat
                        Redhat
                    No data.