CVE-2020-11023 — JQuery Cross-Site Scripting (XSS) Vulnerability
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted cod
Published
2020-04-29T00:00:00.000Z
Last modified
2025-10-21T23:35:45.230Z
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N
CISA KEV — Actively Exploited
01What is this vulnerability?
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
02Affected products
| Vendor | Product | Versions |
|---|
| jquery | jQuery | >= 1.0.3, < 3.5.0 |
03Active exploitation status
Yes — actively exploited. Added to the CISA KEV catalog on 2025-01-23. Ransomware use: Unknown.
04Recommended remediation
- Patch to a fixed version listed in the vendor advisory (see references below).
- Mitigate with WAF rules, network egress filters, or feature flags where the patch is not yet available.
- Hunt historical logs for exploitation indicators — see Detection signatures below.
05Technical details
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
06Detection signatures
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
Open in Sigma generator →
07Related CVEs
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.
08Timeline
- Published: 2020-04-29T00:00:00.000Z
- Last modified: 2025-10-21T23:35:45.230Z
- Added to CISA KEV: 2025-01-23
- BOD 22-01 due: 2025-02-13
09References
- www.debian.org — https://www.debian.org/security/2020/dsa-4693
- lists.fedoraproject.org — https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro…
- www.oracle.com — https://www.oracle.com/security-alerts/cpujul2020.html
- jquery.com — https://jquery.com/upgrade-guide/3.5/
- security.netapp.com — https://security.netapp.com/advisory/ntap-20200511-0006/
- www.drupal.org — https://www.drupal.org/sa-core-2020-002
- github.com — https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6
- blog.jquery.com — https://blog.jquery.com/2020/04/10/jquery-3-5-0-released
- lists.opensuse.org — http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html
- security.gentoo.org — https://security.gentoo.org/glsa/202007-03
- lists.opensuse.org — http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html
- lists.apache.org — https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3…
- lists.apache.org — https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec88…
- lists.apache.org — https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428…
- lists.apache.org — https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a20…
- lists.apache.org — https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee…
- lists.apache.org — https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1f…
- lists.apache.org — https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76…
- lists.apache.org — https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5…
- lists.apache.org — https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae…
- lists.apache.org — https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614da…
- lists.apache.org — https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d…
- lists.apache.org — https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d0…
- lists.apache.org — https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270…
- lists.fedoraproject.org — https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro…
- lists.fedoraproject.org — https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro…
- lists.apache.org — https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8…
- lists.apache.org — https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f560411357351489…
- lists.apache.org — https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f…
- lists.apache.org — https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583…
Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →