-
Notifications
You must be signed in to change notification settings - Fork 102
Description
Vulnerable Library - bootstrap-3.4.1.min.js
The most popular front-end framework for developing responsive, mobile first projects on the web.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.4.1/js/bootstrap.min.js
Path to dependency file: /licenses/mit license - mit-license.html
Path to vulnerable library: /licenses/mit license - mit-license.html,/licenses/public domain, per creative commons cc0 - 1.0.html
Found in HEAD commit: 59403f1cfff628956549b34b2abc1fc6294ce3b4
Vulnerabilities
| Vulnerability | Severity | Dependency | Type | Fixed in (bootstrap version) | Remediation Possible** | |
|---|---|---|---|---|---|---|
| CVE-2024-6485 | 6.4 | bootstrap-3.4.1.min.js | Direct | https://github.com/twbs/bootstrap.git - v4.0.0 | ❌ | |
| CVE-2025-1647 | 5.6 | bootstrap-3.4.1.min.js | Direct | bootstrap - 4.0.0,twitter-bootstrap - 4.0.0 | ❌ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-6485
Vulnerable Library - bootstrap-3.4.1.min.js
The most popular front-end framework for developing responsive, mobile first projects on the web.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.4.1/js/bootstrap.min.js
Path to dependency file: /licenses/mit license - mit-license.html
Path to vulnerable library: /licenses/mit license - mit-license.html,/licenses/public domain, per creative commons cc0 - 1.0.html
Dependency Hierarchy:
- ❌ bootstrap-3.4.1.min.js (Vulnerable Library)
Found in HEAD commit: 59403f1cfff628956549b34b2abc1fc6294ce3b4
Found in base branch: main
Vulnerability Details
A security vulnerability has been discovered in bootstrap that could enable Cross-Site Scripting (XSS) attacks. The vulnerability is associated with the data-loading-text attribute within the button plugin. This vulnerability can be exploited by injecting malicious JavaScript code into the attribute, which would then be executed when the button's loading state is triggered.
Publish Date: 2024-07-11
URL: CVE-2024-6485
CVSS 3 Score Details (6.4)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: Low
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: https://getbootstrap.com/docs/3.3/javascript/#buttons
Release Date: 2024-07-11
Fix Resolution: https://github.com/twbs/bootstrap.git - v4.0.0
Step up your Open Source Security Game with Mend here
CVE-2025-1647
Vulnerable Library - bootstrap-3.4.1.min.js
The most popular front-end framework for developing responsive, mobile first projects on the web.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.4.1/js/bootstrap.min.js
Path to dependency file: /licenses/mit license - mit-license.html
Path to vulnerable library: /licenses/mit license - mit-license.html,/licenses/public domain, per creative commons cc0 - 1.0.html
Dependency Hierarchy:
- ❌ bootstrap-3.4.1.min.js (Vulnerable Library)
Found in HEAD commit: 59403f1cfff628956549b34b2abc1fc6294ce3b4
Found in base branch: main
Vulnerability Details
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Bootstrap allows Cross-Site Scripting (XSS).This issue affects Bootstrap: from 3.4.1 before 4.0.0.
Publish Date: 2025-05-15
URL: CVE-2025-1647
CVSS 3 Score Details (5.6)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2025-1647
Release Date: 2025-05-15
Fix Resolution: bootstrap - 4.0.0,twitter-bootstrap - 4.0.0
Step up your Open Source Security Game with Mend here