Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:gem/jquery-rails@4.0.0.beta2
purl pkg:gem/jquery-rails@4.0.0.beta2
Next non-vulnerable version 4.4.0
Latest non-vulnerable version 4.4.0
Risk 10.0
Vulnerabilities affecting this package (7)
Vulnerability Summary Fixed by
VCID-356q-csk2-8ug5
Aliases:
CVE-2015-1840
GHSA-4whc-pp4x-9pf3
jquery-rails and jquery-ujs subject to Exposure of Sensitive Information jquery_ujs.js in jquery-rails before 3.1.3 and 4.x before 4.0.4 and rails.js in jquery-ujs before 1.0.4, as used with Ruby on Rails 3.x and 4.x, allow remote attackers to bypass the Same Origin Policy, and trigger transmission of a CSRF token to a different-domain web server, via a leading space character in a URL within an attribute value.
4.0.4
Affected by 6 other vulnerabilities.
VCID-3s9f-prpy-hbcx
Aliases:
CVE-2019-11358
GHSA-6c3j-c64m-qhgq
Cross-site Scripting The jQuery library, which is included in rdoc, mishandles `jQuery.extend(true, {}, ...)` because of Object.prototype pollution. If an unsanitized source object contained an enumerable `__proto__` property, it could extend the native `Object.prototype.`
4.3.4
Affected by 3 other vulnerabilities.
VCID-5618-53yg-8qh4
Aliases:
CVE-2020-11022
GHSA-gxr4-xjj5-5px2
Potential XSS vulnerability in jQuery ### Impact Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code. ### Patches This problem is patched in jQuery 3.5.0. ### Workarounds To workaround the issue without upgrading, adding the following to your code: ```js jQuery.htmlPrefilter = function( html ) { return html; }; ``` You need to use at least jQuery 1.12/2.2 or newer to be able to apply this workaround. ### References https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://jquery.com/upgrade-guide/3.5/ ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery repo](https://github.com/jquery/jquery/issues). If you don't find an answer, open a new issue.
4.4.0
Affected by 0 other vulnerabilities.
VCID-8mpx-4ueh-qqfv
Aliases:
CVE-2020-23064
GHSA-257q-pv89-v3xv
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Cross Site Scripting vulnerability in jQuery 2.2.0 through 3.x before 3.5.0 allows a remote attacker to execute arbitrary code via the <options> element.
4.4.0
Affected by 0 other vulnerabilities.
VCID-cvxp-ctj9-guej
Aliases:
CVE-2020-11023
GHSA-jpcq-cgw6-v4j6
Potential XSS vulnerability in jQuery ### Impact Passing HTML containing `<option>` elements from untrusted sources - even after sanitizing them - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code. ### Patches This problem is patched in jQuery 3.5.0. ### Workarounds To workaround this issue without upgrading, use [DOMPurify](https://github.com/cure53/DOMPurify) with its `SAFE_FOR_JQUERY` option to sanitize the HTML string before passing it to a jQuery method. ### References https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery repo](https://github.com/jquery/jquery/issues). If you don't find an answer, open a new issue.
4.4.0
Affected by 0 other vulnerabilities.
VCID-hent-wkr8-c7hb
Aliases:
CVE-2016-10707
GHSA-mhpp-875w-9cpv
Denial of Service in jquery Affected versions of `jquery` use a lowercasing logic on attribute names. When given a boolean attribute with a name that contains uppercase characters, `jquery` enters into an infinite recursion loop, exceeding the call stack limit, and resulting in a denial of service condition. There are no reported fixed by versions.
VCID-tmjp-8edk-nyh3
Aliases:
CVE-2015-9251
GHSA-rmxg-73gg-4p98
The jQuery library, which is included in rdoc, is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing `text/javascript` responses to be executed.
4.2.0
Affected by 5 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T22:32:31.326973+00:00 GitLab Importer Affected by VCID-8mpx-4ueh-qqfv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/jquery-rails/CVE-2020-23064.yml 38.4.0
2026-04-16T21:03:04.139853+00:00 GitLab Importer Affected by VCID-cvxp-ctj9-guej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/jquery-rails/CVE-2020-11023.yml 38.4.0
2026-04-16T21:02:59.226279+00:00 GitLab Importer Affected by VCID-5618-53yg-8qh4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/jquery-rails/CVE-2020-11022.yml 38.4.0
2026-04-16T20:54:02.285664+00:00 GitLab Importer Affected by VCID-3s9f-prpy-hbcx https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/jquery-rails/CVE-2019-11358.yml 38.4.0
2026-04-16T20:41:17.896716+00:00 GitLab Importer Affected by VCID-tmjp-8edk-nyh3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/jquery-rails/CVE-2015-9251.yml 38.4.0
2026-04-16T17:37:45.167320+00:00 Ruby Importer Affected by VCID-hent-wkr8-c7hb https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2016-10707.yml 38.4.0
2026-04-16T17:36:04.025321+00:00 Ruby Importer Affected by VCID-356q-csk2-8ug5 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2015-1840.yml 38.4.0
2026-04-16T01:32:32.618355+00:00 GHSA Importer Affected by VCID-cvxp-ctj9-guej https://github.com/advisories/GHSA-jpcq-cgw6-v4j6 38.4.0
2026-04-16T01:32:27.477403+00:00 GHSA Importer Affected by VCID-5618-53yg-8qh4 https://github.com/advisories/GHSA-gxr4-xjj5-5px2 38.4.0
2026-04-11T23:51:23.016467+00:00 GitLab Importer Affected by VCID-8mpx-4ueh-qqfv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/jquery-rails/CVE-2020-23064.yml 38.3.0
2026-04-11T22:14:25.882753+00:00 GitLab Importer Affected by VCID-cvxp-ctj9-guej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/jquery-rails/CVE-2020-11023.yml 38.3.0
2026-04-11T22:14:21.735693+00:00 GitLab Importer Affected by VCID-5618-53yg-8qh4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/jquery-rails/CVE-2020-11022.yml 38.3.0
2026-04-11T22:04:58.056378+00:00 GitLab Importer Affected by VCID-3s9f-prpy-hbcx https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/jquery-rails/CVE-2019-11358.yml 38.3.0
2026-04-11T21:51:52.616297+00:00 GitLab Importer Affected by VCID-tmjp-8edk-nyh3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/jquery-rails/CVE-2015-9251.yml 38.3.0
2026-04-11T21:34:41.028878+00:00 Ruby Importer Affected by VCID-hent-wkr8-c7hb https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2016-10707.yml 38.3.0
2026-04-11T21:32:51.504503+00:00 Ruby Importer Affected by VCID-356q-csk2-8ug5 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2015-1840.yml 38.3.0
2026-04-11T13:01:51.046876+00:00 GHSA Importer Affected by VCID-cvxp-ctj9-guej https://github.com/advisories/GHSA-jpcq-cgw6-v4j6 38.3.0
2026-04-11T13:01:48.219993+00:00 GHSA Importer Affected by VCID-5618-53yg-8qh4 https://github.com/advisories/GHSA-gxr4-xjj5-5px2 38.3.0
2026-04-02T23:54:36.944545+00:00 GitLab Importer Affected by VCID-8mpx-4ueh-qqfv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/jquery-rails/CVE-2020-23064.yml 38.1.0
2026-04-02T22:26:45.861519+00:00 GitLab Importer Affected by VCID-cvxp-ctj9-guej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/jquery-rails/CVE-2020-11023.yml 38.1.0
2026-04-02T22:26:42.106358+00:00 GitLab Importer Affected by VCID-5618-53yg-8qh4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/jquery-rails/CVE-2020-11022.yml 38.1.0
2026-04-02T22:17:52.082660+00:00 GitLab Importer Affected by VCID-3s9f-prpy-hbcx https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/jquery-rails/CVE-2019-11358.yml 38.1.0
2026-04-02T22:05:40.169421+00:00 GitLab Importer Affected by VCID-tmjp-8edk-nyh3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/jquery-rails/CVE-2015-9251.yml 38.1.0
2026-04-02T19:32:59.991627+00:00 Ruby Importer Affected by VCID-hent-wkr8-c7hb https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2016-10707.yml 38.1.0
2026-04-02T19:31:21.865339+00:00 Ruby Importer Affected by VCID-356q-csk2-8ug5 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2015-1840.yml 38.1.0
2026-04-02T13:53:50.087247+00:00 GHSA Importer Affected by VCID-cvxp-ctj9-guej https://github.com/advisories/GHSA-jpcq-cgw6-v4j6 38.1.0
2026-04-02T13:53:47.580382+00:00 GHSA Importer Affected by VCID-5618-53yg-8qh4 https://github.com/advisories/GHSA-gxr4-xjj5-5px2 38.1.0
2026-04-01T16:44:42.429585+00:00 GitLab Importer Affected by VCID-cvxp-ctj9-guej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/jquery-rails/CVE-2020-11023.yml 38.0.0
2026-04-01T16:44:38.147650+00:00 GitLab Importer Affected by VCID-5618-53yg-8qh4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/jquery-rails/CVE-2020-11022.yml 38.0.0
2026-04-01T16:35:31.682458+00:00 GitLab Importer Affected by VCID-3s9f-prpy-hbcx https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/jquery-rails/CVE-2019-11358.yml 38.0.0
2026-04-01T16:22:37.645604+00:00 GitLab Importer Affected by VCID-tmjp-8edk-nyh3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/jquery-rails/CVE-2015-9251.yml 38.0.0
2026-04-01T15:49:57.083322+00:00 Ruby Importer Affected by VCID-hent-wkr8-c7hb https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2016-10707.yml 38.0.0
2026-04-01T15:48:09.909920+00:00 Ruby Importer Affected by VCID-356q-csk2-8ug5 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2015-1840.yml 38.0.0