Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2469 | Qwik is a performance focused javascript framework. A potential mutation XSS vulnerability exists in Qwik for versions up to but not including 1.6.0. Qwik improperly escapes HTML on server-side rendering. It converts strings according to the rules found in the `render-ssr.ts` file. It sometimes causes the situation that the final DOM tree rendered on browsers is different from what Qwik expects on server-side rendering. This may be leveraged to perform XSS attacks, and a type of the XSS is known as mXSS (mutation XSS). This has been resolved in qwik version 1.6.0 and @builder.io/qwik version 1.7.3. All users are advised to upgrade. There are no known workarounds for this vulnerability. |
Github GHSA |
GHSA-2rwj-7xq8-4gx4 | Qwik has a potential mXSS vulnerability due to improper HTML escaping |
Mon, 12 Aug 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qwik
Qwik qwik |
|
| CPEs | cpe:2.3:a:qwik:qwik:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Qwik
Qwik qwik |
Thu, 08 Aug 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qwikdev
Qwikdev qwik |
|
| CPEs | cpe:2.3:a:qwikdev:qwik:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Qwikdev
Qwikdev qwik |
|
| Metrics |
ssvc
|
Tue, 06 Aug 2024 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Qwik is a performance focused javascript framework. A potential mutation XSS vulnerability exists in Qwik for versions up to but not including 1.6.0. Qwik improperly escapes HTML on server-side rendering. It converts strings according to the rules found in the `render-ssr.ts` file. It sometimes causes the situation that the final DOM tree rendered on browsers is different from what Qwik expects on server-side rendering. This may be leveraged to perform XSS attacks, and a type of the XSS is known as mXSS (mutation XSS). This has been resolved in qwik version 1.6.0 and @builder.io/qwik version 1.7.3. All users are advised to upgrade. There are no known workarounds for this vulnerability. | |
| Title | Cross-site Scripting (XSS) vulnerability due to improper HTML escaping in qwik | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-08T19:04:29.078Z
Reserved: 2024-07-18T15:21:47.486Z
Link: CVE-2024-41677
Updated: 2024-08-08T19:04:13.675Z
Status : Analyzed
Published: 2024-08-06T18:15:56.883
Modified: 2024-08-12T18:51:29.497
Link: CVE-2024-41677
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA