CVE-2021-37504
moderate-risk
Published 2022-02-25
A cross-site scripting (XSS) vulnerability in the fileNameStr parameter of jQuery-Upload-File v4.0.11 allows attackers to execute arbitrary web scripts or HTML via a crafted file with a Javascript payload in the file name.
Do I need to act?
-
0.72% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.1/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (14)
Third Party Advisory
http://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js
Third Party Advisory
http://hayageek.github.io/jQuery-Upload-File/4.0.11/jquery.uploadfile.min.js
Third Party Advisory
http://hayageek.github.io/jQuery-Upload-File/4.0.11/uploadfile.css
Broken Link
http://haygeek.com
Broken Link
http://jquery-upload-file.com
Third Party Advisory
https://github.com/hayageek/jquery-upload-file/blob/master/js/jquery.uploadfile....
Third Party Advisory
https://raw.githubusercontent.com/hayageek/jquery-upload-file/master/js/jquery.u...
Third Party Advisory
http://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js
Third Party Advisory
http://hayageek.github.io/jQuery-Upload-File/4.0.11/jquery.uploadfile.min.js
Third Party Advisory
http://hayageek.github.io/jQuery-Upload-File/4.0.11/uploadfile.css
Broken Link
http://haygeek.com
Broken Link
http://jquery-upload-file.com
Third Party Advisory
https://github.com/hayageek/jquery-upload-file/blob/master/js/jquery.uploadfile....
Third Party Advisory
https://raw.githubusercontent.com/hayageek/jquery-upload-file/master/js/jquery.u...
30
/ 100
moderate-risk
Severity
23/34 · High
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal