Description
Slim Select 2.0 versions through 2.9.0 are affected by a potential cross-site scripting vulnerability. In select.ts:createOption(), the text variable from the user-provided Options object is assigned to an innerHTML without sanitation. Software that depends on this library to dynamically generate lists using unsanitized user-provided input may be vulnerable to cross-site scripting, resulting in attacker executed JavaScript. At this time, no patch is available.
Problem types
CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Product status
2.0 (semver)
Credits
Alexis Marquois
References
vulncheck.com/advisories/slim-select-xss
github.com/brianvoe/slim-select/issues/564
github.com/...d98d6b8f278524ead79e/src/slim-select/select.ts