The creators of the jQuery Validation Plugin have finally addressed a vulnerability in a demo component that was first reported to them more than three years ago.
The jQuery Validation Plugin, which is written and maintained by Jörn Zaefferer of the jQuery team, is a plugin that enables easy form validation. Dutch security consultant Sijmen Ruwhof discovered a cross-site scripting (XSS) vulnerability in the plugin’s CAPTCHA demo script.
While the security hole affects the demo code and not the plugin itself, the researcher has decided to disclose the existence of the flaw because he believes many developers install the demo code along with the plugin.
“With this severe vulnerability session hijacking is possible in most cases via a reflected cross-site scripting attack, which can result in identity theft (if session cookies aren’t protected via HttpOnly),” Ruwhof explained in a blog post.
Ruwhof released the details of the vulnerability on Tuesday, three months after notifying the plugin’s developers. However, the Dutch researcher wasn’t the first to find and report the vulnerability. The earliest reports of this security hole are from June 2011, but the buggy CAPTCHA code seems to be around since 2007.
“As it seems, the cross-site scripting vulnerability was introduced by the developer of the CAPTCHA script and not by author of the jQuery Validation Plugin,” Ruwhof said.
The vulnerability remained unfixed until Wednesday when Zaefferer patched the plugin.
A Google search for a piece of code specific to websites that could be vulnerable returned 12,000 results. Searching for code found in the original CAPTCHA script returned 8,100 results. The researcher believes that roughly 20,000 websites are affected by the XSS vulnerability.
“This story is about taking responsibility for any code that ships with your software and taking security serious. This story is also about knowing where your code came from, who wrote it and the habit of blindly copying code with all kind of security implications,” Ruwhof said.
XSS vulnerabilities are highly common, but that doesn’t mean they’re less dangerous. Back in May, Google released a simple game to teach Web application developers how to spot XSS flaws in their code.

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- CISA Warns of Old JBoss RichFaces Vulnerability Being Exploited in Attacks
- NIST Publishes Final Version of 800-82r3 OT Security Guide
- Johnson Controls Hit by Ransomware
- Verisoul Raises $3.25 Million in Seed Funding to Detect Fake Users
- Government Shutdown Could Bench 80% of CISA Staff
- Google Rushes to Patch New Zero-Day Exploited by Spyware Vendor
- macOS 14 Sonoma Patches 60 Vulnerabilities
- New GPU Side-Channel Attack Allows Malicious Websites to Steal Data
Latest News
- Bankrupt IronNet Shuts Down Operations
- AWS Using MadPot Decoy System to Disrupt APTs, Botnets
- Generative AI Startup Nexusflow Raises $10.6 Million
- In Other News: RSA Encryption Attack, Meta AI Privacy, ShinyHunters Hacker Guilty Plea
- Researchers Extract Sounds From Still Images on Smartphone Cameras
- National Security Agency is Starting an Artificial Intelligence Security Center
- CISA Warns of Old JBoss RichFaces Vulnerability Being Exploited in Attacks
- Hackers Set Sights on Apache NiFi Flaw That Exposes Many Organizations to Attacks
