Description
Accepting the value of the of option of the .position() util from untrusted sources may execute untrusted code. For example, invoking the following code:
will call the doEvilThing() function.
Recommendation
Update the jquery-ui package to the latest compatible version. Followings are version details:
- Affected version(s): < 1.13.0
- Patched version(s): 1.13.0
References
- GHSA-gpqq-952q-5327
- www.drupal.org
- www.oracle.com
- www.tenable.com
- lists.debian.org
- security.netapp.com
- lists.fedoraproject.org
- blog.jqueryui.com
- seclists.org
- CVE-2021-41184
- CWE-79
- CAPEC-310
- OWASP 2021-A3
- OWASP 2021-A6
Related Issues
- Seroval affected by Denial of Service via Array serialization - CVE-2026-23957
- QuestDB UI's Web Console is Vulnerable to Cross-Site Scripting - CVE-2026-0824
- The AuthKit Remix Library renders sensitive auth data in HTML - CVE-2025-55009
- jQuery UI vulnerable to XSS when refreshing a checkboxradio with an HTML-like initial text label - CVE-2022-31160
- Tags:
- npm
- jquery-ui
Anything's wrong? Let us know Last updated on November 04, 2025