11.30.0
are vulnerable to a reflected XSS. An attacker can execute arbitrary code when either:
flashMessage
feature is used and user input or data from URL parameters is incorporated into the flashMessage
.languageDictionary
feature is used and user input or data from URL parameters is incorporated into the languageDictionary
.auth0-lock
version 11.30.0
or older.flashMessage
feature.flashMessage
.text
property of a flashMessage
:
auth0-lock
version 11.30.0
or older.languageDictionary
feature.languageDictionary
properties.socialLoginInstructions
property of a languageDictionary
:
auth0-lock
version 11.30.1
.
flashMessage
and languageDictionary
inputs. It removes any JavaScript in these fields, such as script
tags or onclick
attributes.