Bootstrap Patches XSS Vulnerability in Versions 4.3.1 and 3.4.1

Bootstrap has released versions 4.3.1 and 3.4.1 to patch an XSS vulnerability (CVE-2019-8331) that was reported to the Bootstrap Drupal project by a developer and then responsibly disclosed to the Bootstrap development team. The vulnerability specifically affects usage of the tooltip and popover features:

Earlier this week a developer reported an XSS issue similar to the data-target vulnerability that was fixed in v4.1.2 and v3.4.0: the data-template attribute for our tooltip and popover plugins lacked proper XSS sanitization of the HTML that can be passed into the attribute’s value.

The fix includes a new JavaScript sanitizer that allows only whitelisted HTML elements in the data attribute. Developers can modify Bootstrap’s sanitization implementation or customize their own function. In addition to patching the vulnerability, Bootstrap has published new sanitizer documentation for versions 4.3 and 3.4.

According to data from BuiltWith, Bootstrap is used by approximately 16% of the internet. It is also used widely in WordPress plugins and themes. There are hundreds of listings in the WordPress.org Plugin Directory that implement Bootstrap in one way or another. Many of them have not been updated for months or even longer than a year. It’s tough to say which ones may be affected by this vulnerability, as it depends on how the plugin author has implemented Bootstrap and, in some cases, what the users have decided to output to the frontend. If you have a plugin or theme that uses Bootstrap, it may be worth getting in touch with the author to see if a security update will be necessary.

1 Comment


  1. The theme I use has bootstrap 3.3.7 still!

    Report

Comments are closed.