Vulnerabilities/

Svelecte item names vulnerable to execution of arbitrary JavaScript

Severity:
Medium

Description

Svelecte item names are rendered as raw HTML with no escaping. This allows the injection of arbitrary HTML into the Svelecte dropdown. This can be exploited to execute arbitrary JavaScript whenever a Svelecte dropdown is opened.

Recommendation

Update the svelecte package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
svelecte
Anything's wrong? Let us know Last updated on November 08, 2023

This issue is available in SmartScanner Professional

See Pricing