Cross-site Scripting (XSS) vulnerability due to improper HTML escaping in qwik
Description
Qwik is a performance focused javascript framework. A potential mutation XSS vulnerability exists in Qwik for versions up to but not including 1.6.0. Qwik improperly escapes HTML on server-side rendering. It converts strings according to the rules found in the render-ssr.ts file. It sometimes causes the situation that the final DOM tree rendered on browsers is different from what Qwik expects on server-side rendering. This may be leveraged to perform XSS attacks, and a type of the XSS is known as mXSS (mutation XSS). This has been resolved in qwik version 1.6.0 and @builder.io/qwik version 1.7.3. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@builder.io/qwiknpm | < 1.7.3 | 1.7.3 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-2rwj-7xq8-4gx4ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-41677ghsaADVISORY
- github.com/QwikDev/qwik/blob/v1.5.5/packages/qwik/src/core/render/ssr/render-ssr.tsghsax_refsource_MISCWEB
- github.com/QwikDev/qwik/commit/7e742eb3a1001542d795776c0317d47df8b9d64eghsax_refsource_MISCWEB
- github.com/QwikDev/qwik/security/advisories/GHSA-2rwj-7xq8-4gx4ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.