-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| bootstrap | npm | >= 4.0.0, <= 4.6.2 | 5.0.0 |
| bootstrap | rubygems | >= 4.0.0, <= 4.6.2 | 5.0.0 |
| bootstrap | nuget | >= 4.0.0, <= 4.6.2 | 5.0.0 |
| bootstrap.sass | nuget | >= 4.0.0, <= 4.6.2 | 5.0.0 |
| twbs/bootstrap | composer | >= 4.0.0, <= 4.6.2 | 5.0.0 |
| org.webjars:bootstrap | maven | >= 4.0.0, <= 4.6.2 | 5.0.0 |
| org.webjars.npm:bootstrap | maven | >= 4.0.0, <= 4.6.2 | 5.0.0 |
The vulnerability stems from improper handling of href attributes in carousel controls. The Carousel component's JavaScript logic processes navigation targets by reading href values when data-target is absent, without adequate sanitization. The _getTarget function is directly responsible for extracting target identifiers, while _jQueryInterface manages event binding - both critical points where unsanitized href values could be executed as JavaScript. This matches the advisory's description of XSS via data-slide attributes and href exploitation.
Ongoing coverage of React2Shell