Skip to content

Cross-Site Scripting in react-dom

Moderate severity GitHub Reviewed Published Jan 4, 2019 to the GitHub Advisory Database • Updated Sep 13, 2023

Package

npm react-dom (npm)

Affected versions

= 16.0.0
>= 16.1.0, < 16.1.2
= 16.2.0
>= 16.3.0, < 16.3.3
>= 16.4.0, < 16.4.2

Patched versions

16.0.1
16.1.2
16.2.1
16.3.3
16.4.2

Description

Affected versions of react-dom are vulnerable to Cross-Site Scripting (XSS). The package fails to validate attribute names in HTML tags which may lead to Cross-Site Scripting in specific scenarios. This may allow attackers to execute arbitrary JavaScript in the victim's browser. To be affected by this vulnerability, the application needs to:

  • be a server-side React app
  • be rendered to HTML using ReactDOMServer
  • include an attribute name from user input in an HTML tag

Recommendation

If you are using react-dom 16.0.x, upgrade to 16.0.1 or later.
If you are using react-dom 16.1.x, upgrade to 16.1.2 or later.
If you are using react-dom 16.2.x, upgrade to 16.2.1 or later.
If you are using react-dom 16.3.x, upgrade to 16.3.3 or later.
If you are using react-dom 16.4.x, upgrade to 16.4.2 or later.

References

Published to the GitHub Advisory Database Jan 4, 2019
Reviewed Jun 16, 2020
Last updated Sep 13, 2023

Severity

Moderate
6.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS score

0.084%
(37th percentile)

Weaknesses

CVE ID

CVE-2018-6341

GHSA ID

GHSA-mvjj-gqq2-p4hw

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.