CVE-2020-11611
JavaScript vulnerability analysis and mitigation

Overview

An issue was discovered in xdLocalStorage through 2.0.5. The buildMessage() function in xdLocalStorage.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the iframe object. Therefore any domain that is currently loaded within the iframe can receive the messages that the client sends (NVD).

Technical details

The vulnerability exists in the buildMessage() function of xdLocalStorage.js where it uses a wildcard (*) as the targetOrigin parameter when calling postMessage(). This allows any domain loaded within the iframe to receive messages sent by the client. The vulnerability has a CVSS v3.1 Base Score of 6.1 (MEDIUM) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N (NVD).

Impact

If successfully exploited, an attacker who manages to redirect the 'magical iframe' loaded on the vulnerable application within the user's browser to a domain they control would have access to any information that the client sends to the iframe. Additionally, they could send messages back with a valid requestId which would then be processed by the client, potentially further impacting the security of the client application (GrimHacker).

Mitigation and workarounds

The recommended mitigation is to replace this library with a maintained alternative which includes robust origin validation, or implement validation within the existing library. When using Web Messaging, explicitly state the targetOrigin (do not use the wildcard *) and carefully validate the origin of any received messages to ensure they are from an expected source (GrimHacker).

Community reactions

The issue was first reported in August 2015 when a GitHub issue was opened to notify the project owner. A pull request that included functionality to whitelist origins was submitted but has not been accepted or worked on since July 2016. The last commit on the project was in August 2018, suggesting that a fix from the project maintainer may not be forthcoming (GrimHacker).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23947CRITICAL9.3
  • JavaScriptJavaScript
  • @orval/core
NoYesJan 20, 2026
CVE-2026-23950HIGH8.8
  • JavaScriptJavaScript
  • grafana-graphite
NoYesJan 20, 2026
CVE-2026-22037HIGH8.4
  • JavaScriptJavaScript
  • @fastify/express
NoYesJan 19, 2026
CVE-2026-23522LOW3.7
  • JavaScriptJavaScript
  • @lobehub/chat
NoNoJan 19, 2026
CVE-2025-66803LOW1.7
  • JavaScriptJavaScript
  • @hotwired/turbo
NoYesJan 20, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management