virtual-select-plugin is vulnerable to Cross-site Scripting (XSS)
85
High Risk
Affected versions of this package are affected by an insecure handle when receiving user-controlled option values. JavaScript event handlers embedded within the label or value fields may be executed, which can result in a Cross-Site Scripting (XSS) vulnerability. This issue persists even when the enableSecureText option is activated. An attacker could exploit this vulnerability to inject malicious scripts into the application.
You are affected if you are using a version that falls within the vulnerable range.
virtual-select-plugin is vulnerable to Cross-site Scripting (XSS) in versions 1.0.20 - 1.0.46.
Upgrade the virtual-select-plugin library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant