All the vulnerabilites related to ckeditor - ckeditor5
cve-2025-58064
Vulnerability from cvelistv5
Published
2025-09-03 22:02
Modified
2025-09-04 20:03
Severity ?
EPSS score ?
Summary
CKEditor is susceptible to Cross-Site Scripting (XSS) through its clipboard package
References
▼ | URL | Tags |
---|---|---|
https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-x9gp-vjh6-3wv6 | x_refsource_CONFIRM | |
https://github.com/ckeditor/ckeditor5/commit/b210e90c6cf84e662ef6c7daf93a92355a961bf2 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-58064", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-04T20:03:38.774462Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-04T20:03:46.927Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ckeditor5", "vendor": "ckeditor", "versions": [ { "status": "affected", "version": "\u003e= 46.0.0, \u003c 46.0.3" }, { "status": "affected", "version": "\u003e= 44.2.0, \u003c 45.2.2" } ] } ], "descriptions": [ { "lang": "en", "value": "CKEditor 5 is a modern JavaScript rich-text editor with an MVC architecture. ckeditor5 and ckeditor5-clipboard versions 46.0.0 through 46.0.2 and 44.2.0 through 45.2.1 contain a Cross-Site Scripting (XSS) vulnerability. Ability to exploit could be triggered by a specific user action (leading to unauthorized JavaScript code execution) if the attacker managed to insert a malicious content into the editor, which might happen with a very specific editor configuration. This vulnerability affects installations where the editor configuration meets one of the following criteria: the HTML embed plugin is enabled, or there is a custom plugin introducing an editable element where view RawElement is enabled. This issue is fixed in versions 45.2.2 and 46.0.3 of both ckeditor5 and ckeditor5-clipboard." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 2.3, "baseSeverity": "LOW", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "LOW", "userInteraction": "PASSIVE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-03T22:02:53.296Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-x9gp-vjh6-3wv6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-x9gp-vjh6-3wv6" }, { "name": "https://github.com/ckeditor/ckeditor5/commit/b210e90c6cf84e662ef6c7daf93a92355a961bf2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ckeditor/ckeditor5/commit/b210e90c6cf84e662ef6c7daf93a92355a961bf2" } ], "source": { "advisory": "GHSA-x9gp-vjh6-3wv6", "discovery": "UNKNOWN" }, "title": "CKEditor is susceptible to Cross-Site Scripting (XSS) through its clipboard package" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-58064", "datePublished": "2025-09-03T22:02:53.296Z", "dateReserved": "2025-08-22T14:30:32.222Z", "dateUpdated": "2025-09-04T20:03:46.927Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-25299
Vulnerability from cvelistv5
Published
2025-02-20 19:23
Modified
2025-02-20 19:47
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) in the real-time collaboration package
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-25299", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-20T19:47:00.220316Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-20T19:47:33.534Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ckeditor5", "vendor": "ckeditor", "versions": [ { "status": "affected", "version": "@ckeditor/ckeditor5-real-time-collaboration: \u003e= 41.3.0, \u003c 44.2.1" }, { "status": "affected", "version": "ckeditor5-premium-features: \u003e= 42.0.0, \u003c 44.2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "CKEditor 5 is a modern JavaScript rich-text editor with an MVC architecture. During a recent internal audit, a Cross-Site Scripting (XSS) vulnerability was discovered in the CKEditor 5 real-time collaboration package. This vulnerability affects user markers, which represent users\u0027 positions within the document. It can lead to unauthorized JavaScript code execution, which might happen with a very specific editor and token endpoint configuration. This vulnerability affects only installations with Real-time collaborative editing enabled. The problem has been recognized and patched. The fix is available in version 44.2.1 (and above). Users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 2.3, "baseSeverity": "LOW", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-20T19:23:03.013Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-j3mm-wmfm-mwvh", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-j3mm-wmfm-mwvh" }, { "name": "https://ckeditor.com/docs/ckeditor5/latest/features/collaboration/real-time-collaboration/real-time-collaboration.html", "tags": [ "x_refsource_MISC" ], "url": "https://ckeditor.com/docs/ckeditor5/latest/features/collaboration/real-time-collaboration/real-time-collaboration.html" }, { "name": "https://github.com/ckeditor/ckeditor5/releases/tag/v44.2.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ckeditor/ckeditor5/releases/tag/v44.2.1" } ], "source": { "advisory": "GHSA-j3mm-wmfm-mwvh", "discovery": "UNKNOWN" }, "title": "Cross-site scripting (XSS) in the real-time collaboration package" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-25299", "datePublished": "2025-02-20T19:23:03.013Z", "dateReserved": "2025-02-06T17:13:33.123Z", "dateUpdated": "2025-02-20T19:47:33.534Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31175
Vulnerability from cvelistv5
Published
2022-08-03 19:05
Modified
2025-04-23 17:54
Severity ?
EPSS score ?
Summary
Cross-site scripting caused by the editor instance destroying process in ckeditor5
References
▼ | URL | Tags |
---|---|---|
https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-42wq-rch8-6f6j | x_refsource_CONFIRM | |
https://ckeditor.com/docs/ckeditor5/latest/features/general-html-support.html | x_refsource_MISC | |
https://ckeditor.com/docs/ckeditor5/latest/features/html-embed.html | x_refsource_MISC | |
https://ckeditor.com/docs/ckeditor5/latest/features/markdown.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:11:39.611Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-42wq-rch8-6f6j" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ckeditor.com/docs/ckeditor5/latest/features/general-html-support.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ckeditor.com/docs/ckeditor5/latest/features/html-embed.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ckeditor.com/docs/ckeditor5/latest/features/markdown.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-31175", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T14:02:28.383496Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T17:54:13.307Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ckeditor5", "vendor": "ckeditor", "versions": [ { "status": "affected", "version": "\u003c 35.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "CKEditor 5 is a JavaScript rich text editor. A cross-site scripting vulnerability has been discovered affecting three optional CKEditor 5\u0027s packages in versions prior to 35.0.1. The vulnerability allowed to trigger a JavaScript code after fulfilling special conditions. The affected packages are `@ckeditor/ckeditor5-markdown-gfm`, `@ckeditor/ckeditor5-html-support`, and `@ckeditor/ckeditor5-html-embed`. The specific conditions are 1) Using one of the affected packages. In case of `ckeditor5-html-support` and `ckeditor5-html-embed`, additionally, it was required to use a configuration that allows unsafe markup inside the editor. 2) Destroying the editor instance and 3) Initializing the editor on an element and using an element other than `\u003ctextarea\u003e` as a base. The root cause of the issue was a mechanism responsible for updating the source element with the markup coming from the CKEditor 5 data pipeline after destroying the editor. This vulnerability might affect a small percent of integrators that depend on dynamic editor initialization/destroy and use Markdown, General HTML Support or HTML embed features. The problem has been recognized and patched. The fix is available in version 35.0.1. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-03T19:05:13.000Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-42wq-rch8-6f6j" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ckeditor.com/docs/ckeditor5/latest/features/general-html-support.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ckeditor.com/docs/ckeditor5/latest/features/html-embed.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ckeditor.com/docs/ckeditor5/latest/features/markdown.html" } ], "source": { "advisory": "GHSA-42wq-rch8-6f6j", "discovery": "UNKNOWN" }, "title": "Cross-site scripting caused by the editor instance destroying process in ckeditor5", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31175", "STATE": "PUBLIC", "TITLE": "Cross-site scripting caused by the editor instance destroying process in ckeditor5" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ckeditor5", "version": { "version_data": [ { "version_value": "\u003c 35.0.1" } ] } } ] }, "vendor_name": "ckeditor" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CKEditor 5 is a JavaScript rich text editor. A cross-site scripting vulnerability has been discovered affecting three optional CKEditor 5\u0027s packages in versions prior to 35.0.1. The vulnerability allowed to trigger a JavaScript code after fulfilling special conditions. The affected packages are `@ckeditor/ckeditor5-markdown-gfm`, `@ckeditor/ckeditor5-html-support`, and `@ckeditor/ckeditor5-html-embed`. The specific conditions are 1) Using one of the affected packages. In case of `ckeditor5-html-support` and `ckeditor5-html-embed`, additionally, it was required to use a configuration that allows unsafe markup inside the editor. 2) Destroying the editor instance and 3) Initializing the editor on an element and using an element other than `\u003ctextarea\u003e` as a base. The root cause of the issue was a mechanism responsible for updating the source element with the markup coming from the CKEditor 5 data pipeline after destroying the editor. This vulnerability might affect a small percent of integrators that depend on dynamic editor initialization/destroy and use Markdown, General HTML Support or HTML embed features. The problem has been recognized and patched. The fix is available in version 35.0.1. There are no known workarounds for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-42wq-rch8-6f6j", "refsource": "CONFIRM", "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-42wq-rch8-6f6j" }, { "name": "https://ckeditor.com/docs/ckeditor5/latest/features/general-html-support.html", "refsource": "MISC", "url": "https://ckeditor.com/docs/ckeditor5/latest/features/general-html-support.html" }, { "name": "https://ckeditor.com/docs/ckeditor5/latest/features/html-embed.html", "refsource": "MISC", "url": "https://ckeditor.com/docs/ckeditor5/latest/features/html-embed.html" }, { "name": "https://ckeditor.com/docs/ckeditor5/latest/features/markdown.html", "refsource": "MISC", "url": "https://ckeditor.com/docs/ckeditor5/latest/features/markdown.html" } ] }, "source": { "advisory": "GHSA-42wq-rch8-6f6j", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31175", "datePublished": "2022-08-03T19:05:13.000Z", "dateReserved": "2022-05-18T00:00:00.000Z", "dateUpdated": "2025-04-23T17:54:13.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21254
Vulnerability from cvelistv5
Published
2021-01-29 21:55
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
Regular expression Denial of Service in Markdown plugin
References
▼ | URL | Tags |
---|---|---|
https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-hgmg-hhc8-g5wr | x_refsource_CONFIRM | |
https://github.com/ckeditor/ckeditor5/releases/tag/v25.0.0 | x_refsource_MISC | |
https://www.npmjs.com/package/%40ckeditor/ckeditor5-markdown-gfm | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:14.916Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-hgmg-hhc8-g5wr" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ckeditor/ckeditor5/releases/tag/v25.0.0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-markdown-gfm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ckeditor5", "vendor": "ckeditor", "versions": [ { "status": "affected", "version": "\u003c 25.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "CKEditor 5 is an open source rich text editor framework with a modular architecture. The CKEditor 5 Markdown plugin (@ckeditor/ckeditor5-markdown-gfm) before version 25.0.0 has a regex denial of service (ReDoS) vulnerability. The vulnerability allowed to abuse link recognition regular expression, which could cause a significant performance drop resulting in browser tab freeze. It affects all users using CKEditor 5 Markdown plugin at version \u003c= 24.0.0. The problem has been recognized and patched. The fix will be available in version 25.0.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-29T21:55:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-hgmg-hhc8-g5wr" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ckeditor/ckeditor5/releases/tag/v25.0.0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-markdown-gfm" } ], "source": { "advisory": "GHSA-hgmg-hhc8-g5wr", "discovery": "UNKNOWN" }, "title": "Regular expression Denial of Service in Markdown plugin", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21254", "STATE": "PUBLIC", "TITLE": "Regular expression Denial of Service in Markdown plugin" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ckeditor5", "version": { "version_data": [ { "version_value": "\u003c 25.0.0" } ] } } ] }, "vendor_name": "ckeditor" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CKEditor 5 is an open source rich text editor framework with a modular architecture. The CKEditor 5 Markdown plugin (@ckeditor/ckeditor5-markdown-gfm) before version 25.0.0 has a regex denial of service (ReDoS) vulnerability. The vulnerability allowed to abuse link recognition regular expression, which could cause a significant performance drop resulting in browser tab freeze. It affects all users using CKEditor 5 Markdown plugin at version \u003c= 24.0.0. The problem has been recognized and patched. The fix will be available in version 25.0.0." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400 Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-hgmg-hhc8-g5wr", "refsource": "CONFIRM", "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-hgmg-hhc8-g5wr" }, { "name": "https://github.com/ckeditor/ckeditor5/releases/tag/v25.0.0", "refsource": "MISC", "url": "https://github.com/ckeditor/ckeditor5/releases/tag/v25.0.0" }, { "name": "https://www.npmjs.com/package/@ckeditor/ckeditor5-markdown-gfm", "refsource": "MISC", "url": "https://www.npmjs.com/package/@ckeditor/ckeditor5-markdown-gfm" } ] }, "source": { "advisory": "GHSA-hgmg-hhc8-g5wr", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21254", "datePublished": "2021-01-29T21:55:14", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:14.916Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45613
Vulnerability from cvelistv5
Published
2024-09-25 13:27
Modified
2024-10-01 21:20
Severity ?
EPSS score ?
Summary
CKEditor 5 has Cross-site Scripting vulnerability in the clipboard package
References
▼ | URL | Tags |
---|---|---|
https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-rgg8-g5x8-wr9v | x_refsource_CONFIRM | |
https://github.com/ckeditor/ckeditor5/releases/tag/v43.1.1 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45613", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T14:23:40.264051Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-25T14:23:49.048Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ckeditor5", "vendor": "ckeditor", "versions": [ { "status": "affected", "version": "\u003e= 40.0.0, \u003c 43.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "CKEditor 5 is a JavaScript rich-text editor. Starting in version 40.0.0 and prior to version 43.1.1, a Cross-Site Scripting (XSS) vulnerability is present in the CKEditor 5 clipboard package. This vulnerability could be triggered by a specific user action, leading to unauthorized JavaScript code execution, if the attacker managed to insert a malicious content into the editor, which might happen with a very specific editor configuration. This vulnerability only affects installations where the Block Toolbar plugin is enabled and either the General HTML Support (with a configuration that permits unsafe markup) or the HTML Embed plugin is also enabled. A fix for the problem is available in version 43.1.1. As a workaround, one may disable the block toolbar plugin." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.1, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "ACTIVE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-01T21:20:44.633Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-rgg8-g5x8-wr9v", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-rgg8-g5x8-wr9v" }, { "name": "https://github.com/ckeditor/ckeditor5/releases/tag/v43.1.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ckeditor/ckeditor5/releases/tag/v43.1.1" } ], "source": { "advisory": "GHSA-rgg8-g5x8-wr9v", "discovery": "UNKNOWN" }, "title": "CKEditor 5 has Cross-site Scripting vulnerability in the clipboard package" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45613", "datePublished": "2024-09-25T13:27:03.546Z", "dateReserved": "2024-09-02T16:00:02.425Z", "dateUpdated": "2024-10-01T21:20:44.633Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21391
Vulnerability from cvelistv5
Published
2021-04-29 00:20
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
Regular expression Denial of Service in multiple packages
References
▼ | URL | Tags |
---|---|---|
https://www.npmjs.com/package/%40ckeditor/ckeditor5-markdown-gfm | x_refsource_MISC | |
https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-3rh3-wfr4-76mj | x_refsource_CONFIRM | |
https://www.npmjs.com/package/%40ckeditor/ckeditor5-engine | x_refsource_MISC | |
https://www.npmjs.com/package/%40ckeditor/ckeditor5-font | x_refsource_MISC | |
https://www.npmjs.com/package/%40ckeditor/ckeditor5-image | x_refsource_MISC | |
https://www.npmjs.com/package/%40ckeditor/ckeditor5-list | x_refsource_MISC | |
https://www.npmjs.com/package/%40ckeditor/ckeditor5-media-embed | x_refsource_MISC | |
https://www.npmjs.com/package/%40ckeditor/ckeditor5-paste-from-office | x_refsource_MISC | |
https://www.npmjs.com/package/%40ckeditor/ckeditor5-widget | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:15.938Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-markdown-gfm" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-3rh3-wfr4-76mj" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-engine" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-font" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-image" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-list" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-media-embed" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-paste-from-office" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-widget" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ckeditor5", "vendor": "ckeditor", "versions": [ { "status": "affected", "version": "\u003c 27.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "CKEditor 5 provides a WYSIWYG editing solution. This CVE affects the following npm packages: ckeditor5-engine, ckeditor5-font, ckeditor5-image, ckeditor5-list, ckeditor5-markdown-gfm, ckeditor5-media-embed, ckeditor5-paste-from-office, and ckeditor5-widget. Following an internal audit, a regular expression denial of service (ReDoS) vulnerability has been discovered in multiple CKEditor 5 packages. The vulnerability allowed to abuse particular regular expressions, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 packages listed above at version \u003c= 26.0.0. The problem has been recognized and patched. The fix will be available in version 27.0.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-29T00:20:19", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-markdown-gfm" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-3rh3-wfr4-76mj" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-engine" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-font" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-image" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-list" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-media-embed" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-paste-from-office" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-widget" } ], "source": { "advisory": "GHSA-3rh3-wfr4-76mj", "discovery": "UNKNOWN" }, "title": "Regular expression Denial of Service in multiple packages", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21391", "STATE": "PUBLIC", "TITLE": "Regular expression Denial of Service in multiple packages" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ckeditor5", "version": { "version_data": [ { "version_value": "\u003c 27.0.0" } ] } } ] }, "vendor_name": "ckeditor" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CKEditor 5 provides a WYSIWYG editing solution. This CVE affects the following npm packages: ckeditor5-engine, ckeditor5-font, ckeditor5-image, ckeditor5-list, ckeditor5-markdown-gfm, ckeditor5-media-embed, ckeditor5-paste-from-office, and ckeditor5-widget. Following an internal audit, a regular expression denial of service (ReDoS) vulnerability has been discovered in multiple CKEditor 5 packages. The vulnerability allowed to abuse particular regular expressions, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 packages listed above at version \u003c= 26.0.0. The problem has been recognized and patched. The fix will be available in version 27.0.0." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400: Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.npmjs.com/package/@ckeditor/ckeditor5-markdown-gfm", "refsource": "MISC", "url": "https://www.npmjs.com/package/@ckeditor/ckeditor5-markdown-gfm" }, { "name": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-3rh3-wfr4-76mj", "refsource": "CONFIRM", "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-3rh3-wfr4-76mj" }, { "name": "https://www.npmjs.com/package/@ckeditor/ckeditor5-engine", "refsource": "MISC", "url": "https://www.npmjs.com/package/@ckeditor/ckeditor5-engine" }, { "name": "https://www.npmjs.com/package/@ckeditor/ckeditor5-font", "refsource": "MISC", "url": "https://www.npmjs.com/package/@ckeditor/ckeditor5-font" }, { "name": "https://www.npmjs.com/package/@ckeditor/ckeditor5-image", "refsource": "MISC", "url": "https://www.npmjs.com/package/@ckeditor/ckeditor5-image" }, { "name": "https://www.npmjs.com/package/@ckeditor/ckeditor5-list", "refsource": "MISC", "url": "https://www.npmjs.com/package/@ckeditor/ckeditor5-list" }, { "name": "https://www.npmjs.com/package/@ckeditor/ckeditor5-media-embed", "refsource": "MISC", "url": "https://www.npmjs.com/package/@ckeditor/ckeditor5-media-embed" }, { "name": "https://www.npmjs.com/package/@ckeditor/ckeditor5-paste-from-office", "refsource": "MISC", "url": "https://www.npmjs.com/package/@ckeditor/ckeditor5-paste-from-office" }, { "name": "https://www.npmjs.com/package/@ckeditor/ckeditor5-widget", "refsource": "MISC", "url": "https://www.npmjs.com/package/@ckeditor/ckeditor5-widget" } ] }, "source": { "advisory": "GHSA-3rh3-wfr4-76mj", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21391", "datePublished": "2021-04-29T00:20:19", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:15.938Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }