vendor:
jQuery
by:
xOryus
6.1
CVSS
HIGH
Prototype Pollution & XSS
79
CWE
Product Name: jQuery
Affected Version From: 3.3.2001
Affected Version To: 3.4.X
Patch Exists: YES
Related CWE: CVE-2019-11358, CVE-2020-7656
CPE: a:jquery:jquery:3.3.1
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=127742, https://www.infosecmatter.com/nessus-plugin-library/?id=142435, https://www.infosecmatter.com/nessus-plugin-library/?id=149127, https://www.infosecmatter.com/nessus-plugin-library/?id=120442, https://www.infosecmatter.com/nessus-plugin-library/?id=100182, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/multi/http/phpmailer_arg_injection
Platforms Tested: Windows 10, Ubuntu 20.04, Chrome 120, Firefox 112
2025
jQuery Prototype Pollution & XSS Exploit
This exploit leverages two vulnerabilities in jQuery: CVE-2020-7656 which allows for XSS through improper script handling, and CVE-2019-11358 which leads to XSS due to Prototype Pollution. By injecting payloads into a vulnerable page running jQuery versions prior to 3.4.X, malicious actors can run arbitrary JavaScript code in the victim's browser.
Mitigation:
To mitigate this vulnerability, it is recommended to update to the latest version of jQuery (3.4.X or higher) where these issues have been addressed. Additionally, input validation and output encoding should be implemented to prevent XSS attacks.