Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3230-1 | jqueryui security update |
EUVD |
EUVD-2022-6344 | jQuery UI is a curated set of user interface interactions, effects, widgets, and themes built on top of jQuery. Versions prior to 1.13.2 are potentially vulnerable to cross-site scripting. Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. Calling `.checkboxradio( "refresh" )` on such a widget and the initial HTML contained encoded HTML entities will make them erroneously get decoded. This can lead to potentially executing JavaScript code. The bug has been patched in jQuery UI 1.13.2. To remediate the issue, someone who can change the initial HTML can wrap all the non-input contents of the `label` in a `span`. |
Github GHSA |
GHSA-h6gj-6jjq-h8g9 | jQuery UI vulnerable to XSS when refreshing a checkboxradio with an HTML-like initial text label |
Ubuntu USN |
USN-5181-1 | jQuery UI vulnerability |
Ubuntu USN |
USN-6419-1 | jQuery UI vulnerabilities |
Tue, 22 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-22T17:48:33.457Z
Reserved: 2022-05-18T00:00:00.000Z
Link: CVE-2022-31160
Updated: 2024-08-03T07:11:39.646Z
Status : Modified
Published: 2022-07-20T20:15:08.053
Modified: 2024-11-21T07:04:01.617
Link: CVE-2022-31160
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN