vendor:
                    jQuery
                by:
                    xOryus
                6.1
                        CVSS
                    HIGH
                    Prototype Pollution & XSS
                    79
                        CWE
                    Product Name: jQuery
                    Affected Version From:  3.3.2001
                    Affected Version To:  3.4.X
                    Patch Exists: YES
                    Related CWE: CVE-2019-11358, CVE-2020-7656
                    CPE:  a:jquery:jquery:3.3.1
                    
							Other Scripts: 
							https://www.infosecmatter.com/nessus-plugin-library/?id=127742, https://www.infosecmatter.com/nessus-plugin-library/?id=142435, https://www.infosecmatter.com/nessus-plugin-library/?id=149127, https://www.infosecmatter.com/nessus-plugin-library/?id=120442, https://www.infosecmatter.com/nessus-plugin-library/?id=100182, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/multi/http/phpmailer_arg_injection						
                    Platforms Tested:  Windows 10, Ubuntu 20.04, Chrome 120, Firefox 112
                    2025
                    jQuery Prototype Pollution & XSS Exploit
This exploit leverages two vulnerabilities in jQuery: CVE-2020-7656 which allows for XSS through improper script handling, and CVE-2019-11358 which leads to XSS due to Prototype Pollution. By injecting payloads into a vulnerable page running jQuery versions prior to 3.4.X, malicious actors can run arbitrary JavaScript code in the victim's browser.
Mitigation:
					To mitigate this vulnerability, it is recommended to update to the latest version of jQuery (3.4.X or higher) where these issues have been addressed. Additionally, input validation and output encoding should be implemented to prevent XSS attacks.