CVE-2019-11003: Materialize-css vulnerable to Cross-site Scripting in autocomplete component
6.1
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.45059%
CWE
Published
4/9/2019
Updated
8/28/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
materialize-css | npm | <= 1.0.0 | |
@materializecss/materialize | npm | < 1.1.0-alpha | 1.1.0-alpha |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from how Materialize's autocomplete component handles user input. Multiple sources (CVE description, GitHub issue #6286, and Snyk report) show the component injects unescaped content via:
- The renderItem method that creates suggestion elements using innerHTML
- The initialization logic that processes user-supplied data objects without sanitization
The GitHub PR #49 fix introduces textContent usage and an allowUnsafeHTML flag, confirming these were the injection points. The file path is inferred from standard Materialize directory structure and component organization.