First published: Fri Feb 21 2025(Updated: )
solid-js is a declarative, efficient, and flexible JavaScript library for building user interfaces. In affected versions Inserts/JSX expressions inside illegal inlined JSX fragments lacked escaping, allowing user input to be rendered as HTML when put directly inside JSX fragments. This issue has been addressed in version 1.9.4 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
<1.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-27109 has been classified as a high-severity vulnerability due to its ability to allow injection of unescaped HTML from user input.
To fix CVE-2025-27109, update solid-js to version 1.9.4 or later where the vulnerability is addressed.
All versions of solid-js prior to 1.9.4 are affected by CVE-2025-27109.
CVE-2025-27109 is a Cross-Site Scripting (XSS) vulnerability that occurs due to improper escaping of user input.
Yes, CVE-2025-27109 can be exploited remotely by injecting malicious HTML through user input rendered within JSX fragments.