CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4 prior to version 4.18.0. The vulnerability allows someone to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. This problem has been patched in version 4.18.0. There are currently no known workarounds.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-4fc4-4p5g-6w89 | third party advisory |
https://github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949 | third party advisory patch |
https://ckeditor.com/cke4/release/CKEditor-4.18.0 | release notes vendor advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | third party advisory patch |
https://www.drupal.org/sa-core-2022-005 | third party advisory patch |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WOZGMCYDB2OKKULFXZKM6V7JJW4ZZHJP/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VR76VBN5GW5QUBJFHVXRX36UZ6YTCMW6/ | vendor advisory |