CVE-2024-42515: Glossarizer Cross-site Scripting vulnerability
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.32027%
CWE
Published
10/31/2024
Updated
11/1/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| glossarizer | npm | <= 1.5.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper HTML sanitization when converting glossary terms. The Herolab advisory explicitly references line 240 in jquery.glossarize.js where .html() is used to inject content. jQuery's .html() method inherently parses input as HTML, which re-interprets previously escaped characters (like < and >) as actual HTML tags. This creates an XSS vector when attackers supply malicious payloads in glossary terms. The confidence is high because the advisory directly identifies the .html() usage as the root cause, and this aligns with jQuery's documented behavior of executing HTML content passed to .html().