All versions of package materialize-css are vulnerable to Cross-site Scripting (XSS) due to improper escape of user input (such as <not-a-tag />) that is being parsed as HTML/JavaScript, and inserted into the Document Object Model (DOM). This vulnerability can be exploited when the user-input is provided to the autocomplete component.
References
Link | Resource |
---|---|
https://snyk.io/vuln/SNYK-JS-MATERIALIZECSS-2324800 | Exploit Third Party Advisory |
https://github.com/Dogfalo/materialize/blob/v1-dev/js/autocomplete.js%23L285%20 | Broken Link |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2766498 | Exploit Third Party Advisory |
Configurations
Information
Published : 2022-05-01 09:15
Updated : 2022-05-11 08:54
NVD link : CVE-2022-25349
Mitre link : CVE-2022-25349
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
materializecss
- materialize