CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-27109: Lack of Escaping of HTML in JSX Fragments allows for Cross-site Scripting in solid-js

7.3 CVSS

Description

solid-js is a declarative, efficient, and flexible JavaScript library for building user interfaces. In affected versions Inserts/JSX expressions inside illegal inlined JSX fragments lacked escaping, allowing user input to be rendered as HTML when put directly inside JSX fragments. This issue has been addressed in version 1.9.4 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Classification

CVE ID: CVE-2025-27109

CVSS Base Severity: HIGH

CVSS Base Score: 7.3

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Problem Types

CWE-116: Improper Encoding or Escaping of Output CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Affected Products

Vendor: solidjs

Product: solid

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.06% (probability of being exploited)

EPSS Percentile: 14.67% (scored less or equal to compared to others)

EPSS Date: 2025-03-22 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-27109
https://github.com/solidjs/solid/security/advisories/GHSA-3qxh-p7jc-5xh6
https://github.com/solidjs/solid/commit/b93956f28ed75469af6976a98728e313d0edd236

Timeline