CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “jquery”

54 vulnerabilities found for “jquery”

Page 1 of 3

CVE-2023-5464
HIGH8.8

The Jquery accordion slideshow plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 8.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

gopiplus / jquery_accordion_slideshow
Network
Published Oct 31, 2023
Page 1 of 3
CVE-2022-31160
MEDIUM6.1

jQuery UI is a curated set of user interface interactions, effects, widgets, and themes built on top of jQuery. Versions prior to 1.13.2 are potentially vulnerable to cross-site scripting. Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. Calling `.checkboxradio( "refresh" )` on such a widget and the initial HTML contained encoded HTML entities will make them erroneously get decoded. This can lead to potentially executing JavaScript code. The bug has been patched in jQuery UI 1.13.2. To remediate the issue, someone who can change the initial HTML can wrap all the non-input contents of the `label` in a `span`.

jqueryui / jquery_ui+14
Network
Published Jul 20, 2022
CVE-2022-2144
MEDIUM4.3

The Jquery Validation For Contact Form 7 WordPress plugin before 5.3 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change Blog options like default_role, users_can_register via a CSRF attack

jquery_validation_for_contact_form_7_project / jquery_validation_for_contact_form_7
Network
Published Jul 17, 2022
CVE-2022-30241
MEDIUM6.1

The jquery.json-viewer library through 1.4.0 for Node.js does not properly escape characters such as < in a JSON object, as demonstrated by a SCRIPT element.

jquery_json-viewer_project / jquery_json-viewer
Network
Published May 4, 2022
CVE-2022-1291
MEDIUM5.4

XSS vulnerability with default `onCellHtmlData` function in GitHub repository hhurz/tableexport.jquery.plugin prior to 1.25.0. Transmitting cookies to third-party servers. Sending data from secure sessions to third-party servers

tableexport.jquery.plugin_project / tableexport.jquery.plugin
Network
Published Apr 10, 2022
CVE-2021-43862
LOW3.7

jQuery Terminal Emulator is a plugin for creating command line interpreters in your applications. Versions prior to 2.31.1 contain a low impact and limited cross-site scripting (XSS) vulnerability. The code for XSS payload is always visible, but an attacker can use other techniques to hide the code the victim sees. If the application uses the `execHash` option and executes code from URL, the attacker can use this URL to execute their code. The scope is limited because the javascript attribute used is added to span tag, so no automatic execution like with `onerror` on images is possible. This issue is fixed in version 2.31.1. As a workaround, the user can use formatting that wrap whole user input and its no op. The code for this workaround is available in the GitHub Security Advisory. The fix will only work when user of the library is not using different formatters (e.g. to highlight code in different way).

jquery.terminal_project / jquery.terminal
Network
Published Dec 30, 2021
CVE-2021-41184
MEDIUM6.5

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources.

jqueryui / jquery_ui+44
Network
Published Oct 26, 2021
CVE-2021-41182
MEDIUM6.5

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.

jqueryui / jquery_ui+63
Network
Published Oct 26, 2021
CVE-2021-41183
MEDIUM6.5

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources.

jqueryui / jquery_ui+45
Network
Published Oct 26, 2021
CVE-2021-24543
MEDIUM6.1

The jQuery Reply to Comment WordPress plugin through 1.31 does not have any CSRF check when saving its settings, nor sanitise or escape its 'Quote String' and 'Reply String' settings before outputting them in Comments, leading to a Stored Cross-Site Scripting issue.

jquery-reply-to-comment_project / jquery-reply-to-comment
Network
Published Oct 25, 2021
CVE-2021-34663
MEDIUM6.1

The jQuery Tagline Rotator WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of $_SERVER['PHP_SELF'] in the ~/jquery-tagline-rotator.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.1.5.

arvtard / jquery_tagline_rotator
Network
Published Aug 16, 2021
CVE-2021-20083
HIGH8.8

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-plugin-query-object 2.2.3 allows a malicious user to inject properties into Object.prototype.

jquery-plugin-query-object_project / jquery-plugin-query-object
Network
Published Apr 23, 2021
CVE-2018-9208
CRITICAL9.8

Unauthenticated arbitrary file upload vulnerability in jQuery Picture Cut <= v1.1Beta

tuyoshi / jquery_picture_cut
Network
Published Nov 5, 2018
CVE-2018-0645
CRITICAL9.8

MTAppjQuery 1.8.1 and earlier allows remote PHP code execution via unspecified vectors.

bit-part / mtappjquery
Network
Published Sep 7, 2018
CVE-2016-9493
MEDIUM6.1

The code generated by PHP FormMail Generator prior to 17 December 2016 is vulnerable to stored cross-site scripting. In the generated form.lib.php file, upload file types are checked against a hard-coded list of dangerous extensions. This list does not include all variations of PHP files, which may lead to execution of the contained PHP code if the attacker can guess the uploaded filename. The form by default appends a short random string to the end of the filename.

jqueryform / php_formmail_generator
Network
Published Jul 13, 2018
CVE-2016-9482
CRITICAL9.8

Code generated by PHP FormMail Generator may allow a remote unauthenticated user to bypass authentication in the to access the administrator panel by navigating directly to /admin.php?mod=admin&func=panel

jqueryform / php_formmail_generator
Network
Published Jul 13, 2018
CVE-2016-9484
HIGH7.5

The generated PHP form code does not properly validate user input folder directories, allowing a remote unauthenticated attacker to perform a path traversal and access arbitrary files on the server. The PHP FormMail Generator website does not use version numbers and is updated continuously. Any PHP form code generated by this website prior to 2016-12-06 may be vulnerable.

jqueryform / php_formmail_generator
Network
Published Jul 13, 2018
CVE-2016-9483
CRITICAL9.8

The PHP form code generated by PHP FormMail Generator deserializes untrusted input as part of the phpfmg_filman_download() function. A remote unauthenticated attacker may be able to use this vulnerability to inject PHP code, or along with CVE-2016-9484 to perform local file inclusion attacks and obtain files from the server.

jqueryform / php_formmail_generator
Network
Published Jul 13, 2018
CVE-2016-9492
CRITICAL9.8

The code generated by PHP FormMail Generator prior to 17 December 2016 is vulnerable to unrestricted upload of dangerous file types. In the generated form.lib.php file, upload file types are checked against a hard-coded list of dangerous extensions. This list does not include all variations of PHP files, which may lead to execution of the contained PHP code if the attacker can guess the uploaded filename. The form by default appends a short random string to the end of the filename.

jqueryform / php_formmail_generator
Network
Published Jul 13, 2018
CVE-2017-16045
HIGH7.5

`jquery.js` was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.

jquery.js_project / jquery.js
Network
Published Jun 4, 2018