The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2020-11023

CVE-2020-11023: jQuery XSS Vulnerability

CVE-2020-11023 is a cross-site scripting flaw in jQuery that allows untrusted code execution through DOM manipulation methods when processing HTML with option elements. This article covers technical details, affected versions, and patches.

Published: March 11, 2026

CVE-2020-11023 Overview

CVE-2020-11023 is a Cross-Site Scripting (XSS) vulnerability affecting jQuery versions 1.0.3 through 3.4.x. The flaw exists in jQuery's DOM manipulation methods, where passing HTML containing <option> elements from untrusted sources—even after sanitizing—to methods such as .html(), .append(), and similar functions may result in the execution of untrusted JavaScript code. This vulnerability has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog, indicating active exploitation in the wild.

Critical Impact

This vulnerability enables attackers to execute arbitrary JavaScript in users' browsers through specially crafted HTML containing malicious option elements, potentially leading to session hijacking, credential theft, and defacement of web applications.

Affected Products

  • jQuery versions >= 1.0.3 and < 3.5.0
  • Drupal (multiple versions)
  • Oracle WebLogic Server, Application Express, and numerous Oracle products
  • Debian Linux 9.0
  • Fedora 31, 32, 33
  • NetApp Active IQ Unified Manager, SnapCenter Server, and related products
  • Tenable Log Correlation Engine

Discovery Timeline

  • 2020-04-10 - jQuery releases version 3.5.0 with security patch
  • 2020-04-29 - CVE-2020-11023 published to NVD
  • 2025-11-07 - Last updated in NVD database

Technical Details for CVE-2020-11023

Vulnerability Analysis

This vulnerability stems from jQuery's HTML parsing behavior when processing <option> elements within DOM manipulation methods. When untrusted HTML content containing specially crafted <option> tags is passed to jQuery methods like .html(), .append(), .prepend(), .before(), .after(), or .replaceWith(), the library fails to properly sanitize embedded script content.

The exploitation requires user interaction, as an attacker must convince a victim to visit a page containing malicious content or trigger the vulnerable code path. Upon successful exploitation, attackers can execute arbitrary JavaScript within the context of the victim's browser session, enabling theft of session cookies, credential harvesting, keylogging, or redirecting users to malicious sites.

The vulnerability is particularly concerning because standard HTML sanitization libraries may not properly handle the specific parsing quirks that jQuery exhibits with <option> elements. This means applications that believe they have adequately sanitized user input may still be vulnerable if they subsequently pass that content to jQuery DOM manipulation functions.

Root Cause

The root cause lies in jQuery's internal HTML parsing logic, specifically in how the library handles <option> elements during DOM manipulation operations. jQuery's parsing mechanism did not adequately account for edge cases where script execution could occur through crafted option element attributes or nested content. The parser failed to apply consistent sanitization rules when option elements were processed, creating an execution pathway for malicious scripts.

Attack Vector

The attack is network-based and requires user interaction. An attacker crafts malicious HTML containing <option> elements with embedded JavaScript payloads. When this content is processed by a vulnerable jQuery method on a victim's browser, the JavaScript executes within the security context of the hosting domain.

Attack scenarios include:

  • Injecting malicious content through user-controlled input fields that are later rendered using jQuery
  • Exploiting third-party widgets or plugins that use jQuery to process external data
  • Leveraging stored XSS attacks where malicious content persists in a database and is rendered to multiple users

The vulnerability exploits jQuery's DOM manipulation by embedding malicious script content within option element structures that bypass typical sanitization. Attackers can leverage this to steal session tokens, perform actions on behalf of authenticated users, or redirect victims to phishing sites. Detailed technical information is available in the GitHub jQuery Security Advisory.

Detection Methods for CVE-2020-11023

Indicators of Compromise

  • Unexpected JavaScript execution originating from HTML content containing <option> elements
  • Suspicious network requests to external domains from client-side JavaScript that should not make such calls
  • Anomalous user session activity including unexpected password changes or account modifications
  • Browser console errors or warnings related to script execution from dynamically inserted content

Detection Strategies

  • Implement Content Security Policy (CSP) headers to detect and block inline script execution attempts
  • Deploy web application firewalls (WAF) with rules to identify XSS patterns in option elements
  • Use browser-based XSS auditing tools to identify potential exploitation attempts in real-time
  • Review application logs for unusual patterns in user-generated content submissions containing HTML

Monitoring Recommendations

  • Monitor client-side JavaScript errors and exceptions for signs of exploitation attempts
  • Track changes to session cookies and authentication tokens for signs of session hijacking
  • Implement real-time alerting on CSP violation reports indicating blocked script execution
  • Audit third-party JavaScript dependencies for vulnerable jQuery versions using software composition analysis tools

How to Mitigate CVE-2020-11023

Immediate Actions Required

  • Upgrade jQuery to version 3.5.0 or later across all applications and dependencies
  • Audit all application code for usage of jQuery DOM manipulation methods with user-controlled input
  • Implement strict Content Security Policy headers to mitigate XSS impact
  • Review and update any third-party plugins or libraries that bundle vulnerable jQuery versions

Patch Information

jQuery version 3.5.0, released on April 10, 2020, contains the fix for this vulnerability. The patch modifies jQuery's HTML parsing logic to properly sanitize <option> elements and prevent script execution through this vector. Organizations should upgrade to jQuery 3.5.0 or later to remediate this vulnerability. For detailed upgrade instructions, see the jQuery Upgrade Guide to 3.5.

Vendors of affected products have released their own security patches:

  • Drupal Security Advisory SA-CORE-2020-002
  • Oracle Security Alerts (multiple quarterly updates)
  • Debian Security Advisory DSA-4693
  • NetApp Security Advisory NTAP-20200511-0006

Workarounds

  • Use jQuery's .text() method instead of .html() when inserting user-controlled content that should not contain HTML
  • Implement server-side HTML sanitization using libraries like DOMPurify before passing content to jQuery methods
  • Apply input validation to reject or encode HTML option elements in user-supplied data
  • Consider using template literals or DOM APIs that automatically escape content instead of jQuery DOM manipulation
bash
# Check jQuery version in your project dependencies
npm list jquery
# or
yarn list jquery

# Upgrade jQuery to patched version
npm update jquery@^3.5.0
# or
yarn upgrade jquery@^3.5.0

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeXSS

  • Vendor/TechJquery

  • SeverityMEDIUM

  • CVSS Score6.1

  • EPSS Probability36.28%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityLow
  • AvailabilityNone
  • CISA KEV Information
  • In CISA KEVYes
  • CWE References
  • CWE-79
  • Technical References
  • openSUSE Security Announcement July 2020

  • openSUSE Security Announcement July 2020

  • openSUSE Security Announcement November 2020

  • Packet Storm jQuery XSS Exploit

  • GitHub jQuery Security Advisory

  • Apache Flink Developer Mailing List

  • Apache Hive Developer Mailing List

  • Apache Felix Developer Mailing List

  • Apache Hive Issues Mailing List

  • Apache Hive Gitbox Discussion

  • Apache Felix Developer Mailing List

  • Apache Felix Developer Mailing List

  • Apache Flink Issues Mailing List

  • Apache Hive Issues Mailing List

  • Apache Felix Developer Mailing List

  • Apache Flink Issues Mailing List

  • Apache Felix Developer Mailing List

  • Apache Flink Issues Mailing List

  • Apache Hive Issues Mailing List

  • Apache Hive Issues Mailing List

  • Apache Flink Issues Mailing List

  • Apache Flink Issues Mailing List

  • Apache Felix Commits Mailing List

  • Apache Hive Issues Mailing List

  • Apache Felix Developer Mailing List

  • Apache Hive Gitbox Discussion

  • Apache Hive Gitbox Discussion

  • Apache Hive Gitbox Discussion

  • Apache Hive Issues Mailing List

  • Apache Hive Commits Mailing List

  • Apache Hive Issues Mailing List

  • Apache Hive Gitbox Discussion

  • Apache Hive Issues Mailing List

  • Apache Flink Issues Mailing List

  • Apache Hive Issues Mailing List

  • Apache NiFi Commits Mailing List

  • Apache Flink Issues Mailing List

  • Apache Flink Issues Mailing List

  • Apache Flink Issues Mailing List

  • Apache Felix Developer Mailing List

  • Apache Hive Gitbox Discussion

  • Apache Hive Developer Mailing List

  • Debian LTS Announcement March 2021

  • Debian LTS Announcement August 2023

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Gentoo GLSA July 2020

  • NetApp Security Advisory NTAP-20200511-0006

  • Debian Security Advisory DSA-4693

  • Drupal Security Advisory SA-CORE-2020-002

  • Oracle Security Alert January 2021

  • Oracle Security Alert July 2020

  • Oracle Security Alert July 2022

  • Oracle Security Alert October 2020

  • Tenable Security Advisory TNS-2021-02

  • Tenable Security Advisory TNS-2021-10

  • GitHub Advisory Database Entry

  • CISA Known Exploited Vulnerability Catalog
  • Vendor Resources
  • jQuery 3.5.0 Release Announcement

  • jQuery Upgrade Guide to 3.5

  • Oracle Security Alert July 2021

  • Oracle Security Alert April 2021

  • Oracle Security Alert April 2022

  • Oracle Security Alert January 2022

  • Oracle Security Alert October 2021
  • Related CVEs
  • CVE-2020-7656: jQuery XSS Vulnerability via load Method

  • CVE-2020-11022: jQuery DOM Manipulation XSS Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English