Vulnerabilites related to ckeditor - ckeditor5-markdown-gfm
Vulnerability from fkie_nvd
Published
2021-04-29 01:15
Modified
2024-11-21 05:48
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Summary
CKEditor 5 provides a WYSIWYG editing solution. This CVE affects the following npm packages: ckeditor5-engine, ckeditor5-font, ckeditor5-image, ckeditor5-list, ckeditor5-markdown-gfm, ckeditor5-media-embed, ckeditor5-paste-from-office, and ckeditor5-widget. Following an internal audit, a regular expression denial of service (ReDoS) vulnerability has been discovered in multiple CKEditor 5 packages. The vulnerability allowed to abuse particular regular expressions, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 packages listed above at version <= 26.0.0. The problem has been recognized and patched. The fix will be available in version 27.0.0.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ckeditor | ckeditor5-engine | * | |
ckeditor | ckeditor5-font | * | |
ckeditor | ckeditor5-image | * | |
ckeditor | ckeditor5-list | * | |
ckeditor | ckeditor5-markdown-gfm | * | |
ckeditor | ckeditor5-media-embed | * | |
ckeditor | ckeditor5-paste-from-office | * | |
ckeditor | ckeditor5-widget | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ckeditor:ckeditor5-engine:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "67079ED7-67C7-43E6-B2ED-FC8F38073844", "versionEndExcluding": "27.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ckeditor:ckeditor5-font:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "49A57CEA-AF9A-406B-97E3-0174F98CF961", "versionEndExcluding": "27.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ckeditor:ckeditor5-image:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "8AA7F807-41B2-492E-AC3F-ECC940A9D087", "versionEndExcluding": "27.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ckeditor:ckeditor5-list:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "ECFF8404-52EF-49E0-BB96-5C366362DD9E", "versionEndExcluding": "27.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ckeditor:ckeditor5-markdown-gfm:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "2DDE77C4-ECA2-490F-8B67-D9CC0990FF33", "versionEndExcluding": "27.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ckeditor:ckeditor5-media-embed:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "C9FD93F0-391D-4910-846C-B972D0737066", "versionEndExcluding": "27.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ckeditor:ckeditor5-paste-from-office:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "2B80F6F9-37B6-4FE3-B7C6-07931AD022BD", "versionEndExcluding": "27.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ckeditor:ckeditor5-widget:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "2BD4B908-0A73-4410-813D-34A4108052D0", "versionEndExcluding": "27.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "CKEditor 5 provides a WYSIWYG editing solution. This CVE affects the following npm packages: ckeditor5-engine, ckeditor5-font, ckeditor5-image, ckeditor5-list, ckeditor5-markdown-gfm, ckeditor5-media-embed, ckeditor5-paste-from-office, and ckeditor5-widget. Following an internal audit, a regular expression denial of service (ReDoS) vulnerability has been discovered in multiple CKEditor 5 packages. The vulnerability allowed to abuse particular regular expressions, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 packages listed above at version \u003c= 26.0.0. The problem has been recognized and patched. The fix will be available in version 27.0.0." }, { "lang": "es", "value": "CKEditor 5 proporciona una soluci\u00f3n de edici\u00f3n WYSIWYG.\u0026#xa0;Este CVE afecta a los siguientes paquetes npm: ckeditor5-engine, ckeditor5-font, ckeditor5-image, ckeditor5-list, ckeditor5-markdown-gfm, ckeditor5-media-embed, ckeditor5-paste-from-office y ckeditor5-widget.\u0026#xa0;Despu\u00e9s de una auditor\u00eda interna, se detect\u00f3 una vulnerabilidad de denegaci\u00f3n de servicio de expresi\u00f3n regular (ReDoS) en varios paquetes de CKEditor 5.\u0026#xa0;La vulnerabilidad permiti\u00f3 abusar de determinadas expresiones regulares, lo que podr\u00eda causar una perdida significativa del rendimiento, lo que causar\u00eda la congelaci\u00f3n de la pesta\u00f1a del navegador.\u0026#xa0;Afecta a todos los usuarios que usan los paquetes CKEditor 5 enumerados anteriormente en la versi\u00f3n anterior a 26.0.0 e incluy\u00e9ndola.\u0026#xa0;El problema ha sido reconocido y parcheado.\u0026#xa0;La correcci\u00f3n estar\u00e1 disponible en la versi\u00f3n 27.0.0" } ], "id": "CVE-2021-21391", "lastModified": "2024-11-21T05:48:15.750", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-04-29T01:15:07.883", "references": [ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-3rh3-wfr4-76mj" }, { "source": "security-advisories@github.com", "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-engine" }, { "source": "security-advisories@github.com", "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-font" }, { "source": "security-advisories@github.com", "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-image" }, { "source": "security-advisories@github.com", "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-list" }, { "source": "security-advisories@github.com", "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-markdown-gfm" }, { "source": "security-advisories@github.com", "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-media-embed" }, { "source": "security-advisories@github.com", "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-paste-from-office" }, { "source": "security-advisories@github.com", "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-widget" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-3rh3-wfr4-76mj" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-engine" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-font" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-image" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-list" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-markdown-gfm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-media-embed" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-paste-from-office" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-widget" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-03 19:15
Modified
2024-11-21 07:04
Severity ?
5.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L
4.7 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
4.7 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
CKEditor 5 is a JavaScript rich text editor. A cross-site scripting vulnerability has been discovered affecting three optional CKEditor 5's packages in versions prior to 35.0.1. The vulnerability allowed to trigger a JavaScript code after fulfilling special conditions. The affected packages are `@ckeditor/ckeditor5-markdown-gfm`, `@ckeditor/ckeditor5-html-support`, and `@ckeditor/ckeditor5-html-embed`. The specific conditions are 1) Using one of the affected packages. In case of `ckeditor5-html-support` and `ckeditor5-html-embed`, additionally, it was required to use a configuration that allows unsafe markup inside the editor. 2) Destroying the editor instance and 3) Initializing the editor on an element and using an element other than `<textarea>` as a base. The root cause of the issue was a mechanism responsible for updating the source element with the markup coming from the CKEditor 5 data pipeline after destroying the editor. This vulnerability might affect a small percent of integrators that depend on dynamic editor initialization/destroy and use Markdown, General HTML Support or HTML embed features. The problem has been recognized and patched. The fix is available in version 35.0.1. There are no known workarounds for this issue.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ckeditor | ckeditor5-html-embed | * | |
ckeditor | ckeditor5-html-support | * | |
ckeditor | ckeditor5-markdown-gfm | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ckeditor:ckeditor5-html-embed:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "EE0D8A68-02CA-4BF9-AEFA-82B7531691CB", "versionEndExcluding": "35.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ckeditor:ckeditor5-html-support:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "99D2554D-48FD-4E25-953A-9727C7C82DE5", "versionEndExcluding": "35.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ckeditor:ckeditor5-markdown-gfm:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "F2437399-6A77-4BB7-8028-59E948BFED95", "versionEndExcluding": "35.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "CKEditor 5 is a JavaScript rich text editor. A cross-site scripting vulnerability has been discovered affecting three optional CKEditor 5\u0027s packages in versions prior to 35.0.1. The vulnerability allowed to trigger a JavaScript code after fulfilling special conditions. The affected packages are `@ckeditor/ckeditor5-markdown-gfm`, `@ckeditor/ckeditor5-html-support`, and `@ckeditor/ckeditor5-html-embed`. The specific conditions are 1) Using one of the affected packages. In case of `ckeditor5-html-support` and `ckeditor5-html-embed`, additionally, it was required to use a configuration that allows unsafe markup inside the editor. 2) Destroying the editor instance and 3) Initializing the editor on an element and using an element other than `\u003ctextarea\u003e` as a base. The root cause of the issue was a mechanism responsible for updating the source element with the markup coming from the CKEditor 5 data pipeline after destroying the editor. This vulnerability might affect a small percent of integrators that depend on dynamic editor initialization/destroy and use Markdown, General HTML Support or HTML embed features. The problem has been recognized and patched. The fix is available in version 35.0.1. There are no known workarounds for this issue." }, { "lang": "es", "value": "CKEditor 5 es un editor de texto enriquecido en JavaScript. Se ha detectado una vulnerabilidad de tipo cross-site scripting que afecta a tres paquetes opcionales de CKEditor 5 en versiones anteriores a 35.0.1. La vulnerabilidad permit\u00eda desencadenar un c\u00f3digo JavaScript tras cumplir unas condiciones especiales. Los paquetes afectados son \"@ckeditor/ckeditor5-markdown-gfm\", \"@ckeditor/ckeditor5-html-support\", and \"@ckeditor/ckeditor5-html-embed\". Las condiciones espec\u00edficas son 1) Usar uno de los paquetes afectados. En el caso de \"ckeditor5-html-support\" and \"ckeditor5-html-embed\", Adicionalmente, se requer\u00eda usar una configuraci\u00f3n que permitiera un marcado no seguro dentro del editor. 2) Destruir la instancia del editor y 3) Inicializar el editor en un elemento y usar un elemento que no sea \"(textarea)\" como base. La causa del problema era un mecanismo responsable de la actualizaci\u00f3n del elemento fuente con el marcado procedente de la canalizaci\u00f3n de datos de CKEditor 5 despu\u00e9s de destruir el editor. Esta vulnerabilidad podr\u00eda afectar a un peque\u00f1o porcentaje de integradores que dependen de la inicializaci\u00f3n/destrucci\u00f3n din\u00e1mica del editor y que usan las funciones Markdown, General HTML Support o HTML embed. El problema ha sido reconocido y parcheado. La correcci\u00f3n est\u00e1 disponible en versi\u00f3n 35.0.1. No se presentan mitigaciones conocidas para este problema" } ], "id": "CVE-2022-31175", "lastModified": "2024-11-21T07:04:03.343", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-03T19:15:08.017", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://ckeditor.com/docs/ckeditor5/latest/features/general-html-support.html" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://ckeditor.com/docs/ckeditor5/latest/features/html-embed.html" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://ckeditor.com/docs/ckeditor5/latest/features/markdown.html" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-42wq-rch8-6f6j" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://ckeditor.com/docs/ckeditor5/latest/features/general-html-support.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://ckeditor.com/docs/ckeditor5/latest/features/html-embed.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://ckeditor.com/docs/ckeditor5/latest/features/markdown.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-42wq-rch8-6f6j" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
CVE-2022-31175 (GCVE-0-2022-31175)
Vulnerability from cvelistv5
Published
2022-08-03 19:05
Modified
2025-04-23 17:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
CKEditor 5 is a JavaScript rich text editor. A cross-site scripting vulnerability has been discovered affecting three optional CKEditor 5's packages in versions prior to 35.0.1. The vulnerability allowed to trigger a JavaScript code after fulfilling special conditions. The affected packages are `@ckeditor/ckeditor5-markdown-gfm`, `@ckeditor/ckeditor5-html-support`, and `@ckeditor/ckeditor5-html-embed`. The specific conditions are 1) Using one of the affected packages. In case of `ckeditor5-html-support` and `ckeditor5-html-embed`, additionally, it was required to use a configuration that allows unsafe markup inside the editor. 2) Destroying the editor instance and 3) Initializing the editor on an element and using an element other than `<textarea>` as a base. The root cause of the issue was a mechanism responsible for updating the source element with the markup coming from the CKEditor 5 data pipeline after destroying the editor. This vulnerability might affect a small percent of integrators that depend on dynamic editor initialization/destroy and use Markdown, General HTML Support or HTML embed features. The problem has been recognized and patched. The fix is available in version 35.0.1. There are no known workarounds for this issue.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:11:39.611Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-42wq-rch8-6f6j" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ckeditor.com/docs/ckeditor5/latest/features/general-html-support.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ckeditor.com/docs/ckeditor5/latest/features/html-embed.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ckeditor.com/docs/ckeditor5/latest/features/markdown.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-31175", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T14:02:28.383496Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T17:54:13.307Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ckeditor5", "vendor": "ckeditor", "versions": [ { "status": "affected", "version": "\u003c 35.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "CKEditor 5 is a JavaScript rich text editor. A cross-site scripting vulnerability has been discovered affecting three optional CKEditor 5\u0027s packages in versions prior to 35.0.1. The vulnerability allowed to trigger a JavaScript code after fulfilling special conditions. The affected packages are `@ckeditor/ckeditor5-markdown-gfm`, `@ckeditor/ckeditor5-html-support`, and `@ckeditor/ckeditor5-html-embed`. The specific conditions are 1) Using one of the affected packages. In case of `ckeditor5-html-support` and `ckeditor5-html-embed`, additionally, it was required to use a configuration that allows unsafe markup inside the editor. 2) Destroying the editor instance and 3) Initializing the editor on an element and using an element other than `\u003ctextarea\u003e` as a base. The root cause of the issue was a mechanism responsible for updating the source element with the markup coming from the CKEditor 5 data pipeline after destroying the editor. This vulnerability might affect a small percent of integrators that depend on dynamic editor initialization/destroy and use Markdown, General HTML Support or HTML embed features. The problem has been recognized and patched. The fix is available in version 35.0.1. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-03T19:05:13.000Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-42wq-rch8-6f6j" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ckeditor.com/docs/ckeditor5/latest/features/general-html-support.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ckeditor.com/docs/ckeditor5/latest/features/html-embed.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ckeditor.com/docs/ckeditor5/latest/features/markdown.html" } ], "source": { "advisory": "GHSA-42wq-rch8-6f6j", "discovery": "UNKNOWN" }, "title": "Cross-site scripting caused by the editor instance destroying process in ckeditor5", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31175", "STATE": "PUBLIC", "TITLE": "Cross-site scripting caused by the editor instance destroying process in ckeditor5" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ckeditor5", "version": { "version_data": [ { "version_value": "\u003c 35.0.1" } ] } } ] }, "vendor_name": "ckeditor" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CKEditor 5 is a JavaScript rich text editor. A cross-site scripting vulnerability has been discovered affecting three optional CKEditor 5\u0027s packages in versions prior to 35.0.1. The vulnerability allowed to trigger a JavaScript code after fulfilling special conditions. The affected packages are `@ckeditor/ckeditor5-markdown-gfm`, `@ckeditor/ckeditor5-html-support`, and `@ckeditor/ckeditor5-html-embed`. The specific conditions are 1) Using one of the affected packages. In case of `ckeditor5-html-support` and `ckeditor5-html-embed`, additionally, it was required to use a configuration that allows unsafe markup inside the editor. 2) Destroying the editor instance and 3) Initializing the editor on an element and using an element other than `\u003ctextarea\u003e` as a base. The root cause of the issue was a mechanism responsible for updating the source element with the markup coming from the CKEditor 5 data pipeline after destroying the editor. This vulnerability might affect a small percent of integrators that depend on dynamic editor initialization/destroy and use Markdown, General HTML Support or HTML embed features. The problem has been recognized and patched. The fix is available in version 35.0.1. There are no known workarounds for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-42wq-rch8-6f6j", "refsource": "CONFIRM", "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-42wq-rch8-6f6j" }, { "name": "https://ckeditor.com/docs/ckeditor5/latest/features/general-html-support.html", "refsource": "MISC", "url": "https://ckeditor.com/docs/ckeditor5/latest/features/general-html-support.html" }, { "name": "https://ckeditor.com/docs/ckeditor5/latest/features/html-embed.html", "refsource": "MISC", "url": "https://ckeditor.com/docs/ckeditor5/latest/features/html-embed.html" }, { "name": "https://ckeditor.com/docs/ckeditor5/latest/features/markdown.html", "refsource": "MISC", "url": "https://ckeditor.com/docs/ckeditor5/latest/features/markdown.html" } ] }, "source": { "advisory": "GHSA-42wq-rch8-6f6j", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31175", "datePublished": "2022-08-03T19:05:13.000Z", "dateReserved": "2022-05-18T00:00:00.000Z", "dateUpdated": "2025-04-23T17:54:13.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-21391 (GCVE-0-2021-21391)
Vulnerability from cvelistv5
Published
2021-04-29 00:20
Modified
2024-08-03 18:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-400 - Uncontrolled Resource Consumption
Summary
CKEditor 5 provides a WYSIWYG editing solution. This CVE affects the following npm packages: ckeditor5-engine, ckeditor5-font, ckeditor5-image, ckeditor5-list, ckeditor5-markdown-gfm, ckeditor5-media-embed, ckeditor5-paste-from-office, and ckeditor5-widget. Following an internal audit, a regular expression denial of service (ReDoS) vulnerability has been discovered in multiple CKEditor 5 packages. The vulnerability allowed to abuse particular regular expressions, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 packages listed above at version <= 26.0.0. The problem has been recognized and patched. The fix will be available in version 27.0.0.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:15.938Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-markdown-gfm" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-3rh3-wfr4-76mj" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-engine" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-font" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-image" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-list" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-media-embed" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-paste-from-office" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-widget" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ckeditor5", "vendor": "ckeditor", "versions": [ { "status": "affected", "version": "\u003c 27.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "CKEditor 5 provides a WYSIWYG editing solution. This CVE affects the following npm packages: ckeditor5-engine, ckeditor5-font, ckeditor5-image, ckeditor5-list, ckeditor5-markdown-gfm, ckeditor5-media-embed, ckeditor5-paste-from-office, and ckeditor5-widget. Following an internal audit, a regular expression denial of service (ReDoS) vulnerability has been discovered in multiple CKEditor 5 packages. The vulnerability allowed to abuse particular regular expressions, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 packages listed above at version \u003c= 26.0.0. The problem has been recognized and patched. The fix will be available in version 27.0.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-29T00:20:19", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-markdown-gfm" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-3rh3-wfr4-76mj" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-engine" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-font" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-image" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-list" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-media-embed" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-paste-from-office" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/%40ckeditor/ckeditor5-widget" } ], "source": { "advisory": "GHSA-3rh3-wfr4-76mj", "discovery": "UNKNOWN" }, "title": "Regular expression Denial of Service in multiple packages", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21391", "STATE": "PUBLIC", "TITLE": "Regular expression Denial of Service in multiple packages" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ckeditor5", "version": { "version_data": [ { "version_value": "\u003c 27.0.0" } ] } } ] }, "vendor_name": "ckeditor" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CKEditor 5 provides a WYSIWYG editing solution. This CVE affects the following npm packages: ckeditor5-engine, ckeditor5-font, ckeditor5-image, ckeditor5-list, ckeditor5-markdown-gfm, ckeditor5-media-embed, ckeditor5-paste-from-office, and ckeditor5-widget. Following an internal audit, a regular expression denial of service (ReDoS) vulnerability has been discovered in multiple CKEditor 5 packages. The vulnerability allowed to abuse particular regular expressions, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 packages listed above at version \u003c= 26.0.0. The problem has been recognized and patched. The fix will be available in version 27.0.0." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400: Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.npmjs.com/package/@ckeditor/ckeditor5-markdown-gfm", "refsource": "MISC", "url": "https://www.npmjs.com/package/@ckeditor/ckeditor5-markdown-gfm" }, { "name": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-3rh3-wfr4-76mj", "refsource": "CONFIRM", "url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-3rh3-wfr4-76mj" }, { "name": "https://www.npmjs.com/package/@ckeditor/ckeditor5-engine", "refsource": "MISC", "url": "https://www.npmjs.com/package/@ckeditor/ckeditor5-engine" }, { "name": "https://www.npmjs.com/package/@ckeditor/ckeditor5-font", "refsource": "MISC", "url": "https://www.npmjs.com/package/@ckeditor/ckeditor5-font" }, { "name": "https://www.npmjs.com/package/@ckeditor/ckeditor5-image", "refsource": "MISC", "url": "https://www.npmjs.com/package/@ckeditor/ckeditor5-image" }, { "name": "https://www.npmjs.com/package/@ckeditor/ckeditor5-list", "refsource": "MISC", "url": "https://www.npmjs.com/package/@ckeditor/ckeditor5-list" }, { "name": "https://www.npmjs.com/package/@ckeditor/ckeditor5-media-embed", "refsource": "MISC", "url": "https://www.npmjs.com/package/@ckeditor/ckeditor5-media-embed" }, { "name": "https://www.npmjs.com/package/@ckeditor/ckeditor5-paste-from-office", "refsource": "MISC", "url": "https://www.npmjs.com/package/@ckeditor/ckeditor5-paste-from-office" }, { "name": "https://www.npmjs.com/package/@ckeditor/ckeditor5-widget", "refsource": "MISC", "url": "https://www.npmjs.com/package/@ckeditor/ckeditor5-widget" } ] }, "source": { "advisory": "GHSA-3rh3-wfr4-76mj", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21391", "datePublished": "2021-04-29T00:20:19", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:15.938Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }