Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/jqueryui@1.12.1%2Bdfsg-8%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/jqueryui@1.12.1%2Bdfsg-8%2Bdeb11u2?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (7)
Vulnerability Summary Aliases
VCID-8uw3-kz19-w7as jquery-ui Tooltip widget vulnerable to XSS Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo. CVE-2012-6662
GHSA-qqxp-xp9v-vvx6
VCID-btgv-ef3h-83d3 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources. CVE-2021-41182
GHSA-9gj3-hwp5-pmwc
VCID-ctcx-2x3h-7uhc Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Cross-site scripting (XSS) vulnerability in jQuery UI might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function. CVE-2016-7103
GHSA-hpcf-8vf9-q4gj
VCID-ejey-qgbe-97c1 Cross-site Scripting in jquery-ui Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option. CVE-2010-5312
GHSA-wcm2-9c89-wmfm
VCID-gypk-ukbc-7qe3 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources. CVE-2021-41183
GHSA-j7qv-pgf6-hvh4
VCID-kuee-hxg5-qqgt jQuery UI vulnerable to XSS when refreshing a checkboxradio with an HTML-like initial text label ### Impact Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. If you call `.checkboxradio( "refresh" )` on such a widget and the initial HTML contained encoded HTML entities, they will erroneously get decoded. This can lead to potentially executing JavaScript code. For example, starting with the following initial secure HTML: ```html <label> <input id="test-input"> &lt;img src=x onerror="alert(1)"&gt; </label> ``` and calling: ```js $( "#test-input" ).checkboxradio(); $( "#test-input" ).checkboxradio( "refresh" ); ``` will turn the initial HTML into: ```html <label> <!-- some jQuery UI elements --> <input id="test-input"> <img src=x onerror="alert(1)"> </label> ``` and the alert will get executed. ### Patches The bug has been patched in jQuery UI 1.13.2. ### Workarounds To remediate the issue, if you can change the initial HTML, you can wrap all the non-input contents of the `label` in a `span`: ```html <label> <input id="test-input"> <span>&lt;img src=x onerror="alert(1)"&gt;</span> </label> ``` ### References https://blog.jqueryui.com/2022/07/jquery-ui-1-13-2-released/ ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues?q=is%3Aissue+is%3Aopen+sort%3Aupdated-desc). If you don't find an answer, open a new issue. CVE-2022-31160
GHSA-h6gj-6jjq-h8g9
VCID-sbmj-9trz-2ybf Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') jQuery-UI is the official jQuery user interface library.Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources. CVE-2021-41184
GHSA-gpqq-952q-5327

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:31:40.957150+00:00 Debian Importer Fixing VCID-ejey-qgbe-97c1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:48:01.027287+00:00 Debian Importer Fixing VCID-gypk-ukbc-7qe3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:24:41.637187+00:00 Debian Importer Fixing VCID-ctcx-2x3h-7uhc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:14:59.255021+00:00 Debian Importer Fixing VCID-sbmj-9trz-2ybf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:55:46.019246+00:00 Debian Importer Fixing VCID-8uw3-kz19-w7as https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:31:08.953983+00:00 Debian Importer Fixing VCID-btgv-ef3h-83d3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:34:43.517423+00:00 Debian Importer Fixing VCID-kuee-hxg5-qqgt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:20:15.649943+00:00 Debian Importer Fixing VCID-ejey-qgbe-97c1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:46:50.942649+00:00 Debian Importer Fixing VCID-gypk-ukbc-7qe3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:29:41.751421+00:00 Debian Importer Fixing VCID-ctcx-2x3h-7uhc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:22:43.606088+00:00 Debian Importer Fixing VCID-sbmj-9trz-2ybf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:08:32.046011+00:00 Debian Importer Fixing VCID-8uw3-kz19-w7as https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:06:03.944986+00:00 Debian Importer Fixing VCID-btgv-ef3h-83d3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:52.437856+00:00 Debian Importer Fixing VCID-kuee-hxg5-qqgt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:27:54.567809+00:00 Debian Importer Fixing VCID-kuee-hxg5-qqgt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.536686+00:00 Debian Importer Fixing VCID-sbmj-9trz-2ybf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.502289+00:00 Debian Importer Fixing VCID-gypk-ukbc-7qe3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.466388+00:00 Debian Importer Fixing VCID-btgv-ef3h-83d3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.438158+00:00 Debian Importer Fixing VCID-ctcx-2x3h-7uhc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.409833+00:00 Debian Importer Fixing VCID-8uw3-kz19-w7as https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.382435+00:00 Debian Importer Fixing VCID-ejey-qgbe-97c1 https://security-tracker.debian.org/tracker/data/json 38.1.0