CVE-2020-4051

Cross-Site Scripting
Affects
Dojo
in
Dojo
No items found.
Versions
<1.11.10, >=1.12.0 <1.12.9, >=1.13.0 <1.13.8, >=1.14.0 <1.14.7, >=1.15.0 <1.15.4, >=1.16.0 <1.16.3
Exclamation circle icon
Patch Available

This Vulnerability has been fixed in the Never-Ending Support (NES) version offered by HeroDevs.

Overview

Dijit is a widget and UI component library built on Dojo that provides accessible, themeable, and feature-rich form controls, layout containers, editors, and interactive elements for building enterprise web applications.

A low-severity Cross-Site Scripting (XSS) vulnerability (CVE-2020-4051) has been identified in Dijit. The view source feature allows attackers to bypass content restrictions and inject HTML attributes and JavaScript event handlers, leading to arbitrary code execution.

Per OWASP: Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.

Details

Module Info

Vulnerability Info

This low-severity vulnerability is found in many versions of Dojo less than 1.16.3. See the affected versions above for specific details.

The setValue method in dijit/_editor/plugins/LinkDialog.js creates anchor elements by substituting user input into an HTML template without sanitizing the textInput (Description) field. While the URL field was properly escaped, the Description field was not, allowing HTML injection.

Attackers can inject malicious payloads like <img src=x onerror=alert(1)> in the Description field which produces executable HTML. When the link is inserted into the editor, the injected JavaScript executes in the context of the page.

Mitigation

Dijit version 1.7.x is End-of-Life and will not receive any updates to address this issue. For more information see the Dojo website announcement.

Users of the affected components should apply one of the following mitigations:

  • Upgrade affected applications to a fixed version of Dojo/Dijit.
  • Leverage a commercial support partner like HeroDevs for post-EOL security support.

Credits

Vulnerability Details
ID
CVE-2020-4051
PROJECT Affected
Dojo
Versions Affected
<1.11.10, >=1.12.0 <1.12.9, >=1.13.0 <1.13.8, >=1.14.0 <1.14.7, >=1.15.0 <1.15.4, >=1.16.0 <1.16.3
Published date
December 3, 2025
≈ Fix date
November 26, 2025
Fixed in
Severity
Level
CVSS Assessment
Low
>=0 <4
Medium
>=4 <6
High
>=6 <8
Critical
>=8 <10
Low
Category
Cross-Site Scripting
Sign up for the latest vulnerability alerts fixed in
NES for Dojo
Rss feed icon
Subscribe via RSS
or

By clicking “submit” I acknowledge receipt of our Privacy Policy.

Thanks for signing up for our Newsletter! We look forward to connecting with you.
Oops! Something went wrong while submitting the form.