4 results (0.002 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

CKEditor 5 is a JavaScript rich-text editor. Starting in version 40.0.0 and prior to version 43.1.1, a Cross-Site Scripting (XSS) vulnerability is present in the CKEditor 5 clipboard package. This vulnerability could be triggered by a specific user action, leading to unauthorized JavaScript code execution, if the attacker managed to insert a malicious content into the editor, which might happen with a very specific editor configuration. This vulnerability only affects installations where the Block Toolbar plugin is enabled and either the General HTML Support (with a configuration that permits unsafe markup) or the HTML Embed plugin is also enabled. A fix for the problem is available in version 43.1.1. • https://github.com/ckeditor/ckeditor5/releases/tag/v43.1.1 https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-rgg8-g5x8-wr9v • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.8EPSS: 0%CPEs: 3EXPL: 0

CKEditor 5 is a JavaScript rich text editor. A cross-site scripting vulnerability has been discovered affecting three optional CKEditor 5's packages in versions prior to 35.0.1. The vulnerability allowed to trigger a JavaScript code after fulfilling special conditions. The affected packages are `@ckeditor/ckeditor5-markdown-gfm`, `@ckeditor/ckeditor5-html-support`, and `@ckeditor/ckeditor5-html-embed`. The specific conditions are 1) Using one of the affected packages. • https://ckeditor.com/docs/ckeditor5/latest/features/general-html-support.html https://ckeditor.com/docs/ckeditor5/latest/features/html-embed.html https://ckeditor.com/docs/ckeditor5/latest/features/markdown.html https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-42wq-rch8-6f6j • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 8EXPL: 0

CKEditor 5 provides a WYSIWYG editing solution. This CVE affects the following npm packages: ckeditor5-engine, ckeditor5-font, ckeditor5-image, ckeditor5-list, ckeditor5-markdown-gfm, ckeditor5-media-embed, ckeditor5-paste-from-office, and ckeditor5-widget. Following an internal audit, a regular expression denial of service (ReDoS) vulnerability has been discovered in multiple CKEditor 5 packages. The vulnerability allowed to abuse particular regular expressions, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 packages listed above at version <= 26.0.0. • https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-3rh3-wfr4-76mj https://www.npmjs.com/package/%40ckeditor/ckeditor5-engine https://www.npmjs.com/package/%40ckeditor/ckeditor5-font https://www.npmjs.com/package/%40ckeditor/ckeditor5-image https://www.npmjs.com/package/%40ckeditor/ckeditor5-list https://www.npmjs.com/package/%40ckeditor/ckeditor5-markdown-gfm https://www.npmjs.com/package/%40ckeditor/ckeditor5-media-embed https://www.npmjs.com/package/%40ckeditor/ckeditor5-past • CWE-400: Uncontrolled Resource Consumption •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

CKEditor 5 is an open source rich text editor framework with a modular architecture. The CKEditor 5 Markdown plugin (@ckeditor/ckeditor5-markdown-gfm) before version 25.0.0 has a regex denial of service (ReDoS) vulnerability. The vulnerability allowed to abuse link recognition regular expression, which could cause a significant performance drop resulting in browser tab freeze. It affects all users using CKEditor 5 Markdown plugin at version <= 24.0.0. The problem has been recognized and patched. • https://github.com/ckeditor/ckeditor5/releases/tag/v25.0.0 https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-hgmg-hhc8-g5wr https://www.npmjs.com/package/%40ckeditor/ckeditor5-markdown-gfm • CWE-400: Uncontrolled Resource Consumption •