Search for vulnerabilities
Vulnerability details: VCID-w6v5-nfgx-rbbx
Vulnerability ID VCID-w6v5-nfgx-rbbx
Aliases CVE-2016-10735
GHSA-4p24-vmcr-4gqj
Summary Bootstrap Cross-site Scripting vulnerability In Bootstrap 2.x from 2.0.4, 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute. Note that this is a different vulnerability than CVE-2018-14041. See https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/ for more info.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 6.1 https://access.redhat.com/errata/RHBA-2019:1076
generic_textual MODERATE https://access.redhat.com/errata/RHBA-2019:1076
cvssv3.1 6.1 https://access.redhat.com/errata/RHBA-2019:1570
generic_textual MODERATE https://access.redhat.com/errata/RHBA-2019:1570
cvssv3.1 6.1 https://access.redhat.com/errata/RHSA-2019:1456
generic_textual MODERATE https://access.redhat.com/errata/RHSA-2019:1456
cvssv3.1 6.1 https://access.redhat.com/errata/RHSA-2019:3023
generic_textual MODERATE https://access.redhat.com/errata/RHSA-2019:3023
cvssv3.1 6.1 https://access.redhat.com/errata/RHSA-2020:0132
generic_textual MODERATE https://access.redhat.com/errata/RHSA-2020:0132
cvssv3.1 6.1 https://access.redhat.com/errata/RHSA-2020:0133
generic_textual MODERATE https://access.redhat.com/errata/RHSA-2020:0133
cvssv3 6.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10735.json
epss 0.06152 https://api.first.org/data/v1/epss?cve=CVE-2016-10735
epss 0.06152 https://api.first.org/data/v1/epss?cve=CVE-2016-10735
cvssv3.1 6.1 https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2
generic_textual MODERATE https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2
cvssv3 6.1 https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/
cvssv3.1 6.1 https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0
generic_textual MODERATE https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0
cvssv3 6.1 https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-4p24-vmcr-4gqj
cvssv3.1 6.1 https://github.com/github/advisory-database/pull/3281
generic_textual MODERATE https://github.com/github/advisory-database/pull/3281
cvssv3.1 6.1 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2016-10735.yml
generic_textual MODERATE https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2016-10735.yml
cvssv3.1 6.1 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2016-10735.yml
generic_textual MODERATE https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2016-10735.yml
cvssv3.1 6.1 https://github.com/twbs/bootstrap
generic_textual MODERATE https://github.com/twbs/bootstrap
cvssv3.1 6.1 https://github.com/twbs/bootstrap/issues/20184
generic_textual MODERATE https://github.com/twbs/bootstrap/issues/20184
cvssv3.1 6.1 https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906
generic_textual MODERATE https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906
cvssv3.1 6.1 https://github.com/twbs/bootstrap/pull/23679
generic_textual MODERATE https://github.com/twbs/bootstrap/pull/23679
cvssv3.1 6.1 https://github.com/twbs/bootstrap/pull/23687
generic_textual MODERATE https://github.com/twbs/bootstrap/pull/23687
cvssv3.1 6.1 https://github.com/twbs/bootstrap/pull/26460
generic_textual MODERATE https://github.com/twbs/bootstrap/pull/26460
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2016-10735
cvssv3 6.1 https://nvd.nist.gov/vuln/detail/CVE-2016-10735
cvssv3.1 6.1 https://nvd.nist.gov/vuln/detail/CVE-2016-10735
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2016-10735
Reference id Reference type URL
https://access.redhat.com/errata/RHBA-2019:1076
https://access.redhat.com/errata/RHBA-2019:1570
https://access.redhat.com/errata/RHSA-2019:1456
https://access.redhat.com/errata/RHSA-2019:3023
https://access.redhat.com/errata/RHSA-2020:0132
https://access.redhat.com/errata/RHSA-2020:0133
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10735.json
https://api.first.org/data/v1/epss?cve=CVE-2016-10735
https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2
https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/
https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0
https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10735
https://github.com/github/advisory-database/pull/3281
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2016-10735.yml
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2016-10735.yml
https://github.com/twbs/bootstrap
https://github.com/twbs/bootstrap/issues/20184
https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906
https://github.com/twbs/bootstrap/pull/23679
https://github.com/twbs/bootstrap/pull/23687
https://github.com/twbs/bootstrap/pull/26460
https://nvd.nist.gov/vuln/detail/CVE-2016-10735
https://www.tenable.com/security/tns-2021-14
1668097 https://bugzilla.redhat.com/show_bug.cgi?id=1668097
cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*
cpe:2.3:a:getbootstrap:bootstrap:4.0.0:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:getbootstrap:bootstrap:4.0.0:beta:*:*:*:*:*:*
GHSA-4p24-vmcr-4gqj https://github.com/advisories/GHSA-4p24-vmcr-4gqj
RHSA-2020:3936 https://access.redhat.com/errata/RHSA-2020:3936
RHSA-2020:4670 https://access.redhat.com/errata/RHSA-2020:4670
RHSA-2020:4847 https://access.redhat.com/errata/RHSA-2020:4847
RHSA-2020:5571 https://access.redhat.com/errata/RHSA-2020:5571
RHSA-2023:0552 https://access.redhat.com/errata/RHSA-2023:0552
RHSA-2023:0553 https://access.redhat.com/errata/RHSA-2023:0553
RHSA-2023:0554 https://access.redhat.com/errata/RHSA-2023:0554
RHSA-2023:0556 https://access.redhat.com/errata/RHSA-2023:0556
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/errata/RHBA-2019:1076
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/errata/RHBA-2019:1570
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2019:1456
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2019:3023
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2020:0132
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2020:0133
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10735.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/github/advisory-database/pull/3281
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2016-10735.yml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2016-10735.yml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/twbs/bootstrap
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/twbs/bootstrap/issues/20184
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/twbs/bootstrap/pull/23679
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/twbs/bootstrap/pull/23687
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/twbs/bootstrap/pull/26460
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2016-10735
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2016-10735
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2016-10735
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.90358
EPSS Score 0.06152
Published At June 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-01T12:21:47.975677+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/01/GHSA-4p24-vmcr-4gqj/GHSA-4p24-vmcr-4gqj.json 36.1.3