Vulnerability Description
Slim Select 2.0 versions through 2.9.0 are affected by a potential cross-site scripting vulnerability. In select.ts:createOption(), the text variable from the user-provided Options object is assigned to an innerHTML without sanitation. Software that depends on this library to dynamically generate lists using unsanitized user-provided input may be vulnerable to cross-site scripting, resulting in attacker executed JavaScript. At this time, no patch is available.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Slimselectjs | Slim Select | < 2.9.2 |
Related Weaknesses (CWE)
References
- https://github.com/brianvoe/slim-select/blob/e7e37e2ff90e125f846bd98d6b8f278524eProduct
- https://github.com/brianvoe/slim-select/issues/564ExploitIssue Tracking
- https://vulncheck.com/advisories/slim-select-xssThird Party Advisory
FAQ
What is CVE-2024-9440?
CVE-2024-9440 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Slim Select 2.0 versions through 2.9.0 are affected by a potential cross-site scripting vulnerability. In select.ts:createOption(), the text variable from the user-provided Options object is assigned ...
How severe is CVE-2024-9440?
CVE-2024-9440 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-9440?
Check the references section above for vendor advisories and patch information. Affected products include: Slimselectjs Slim Select.