This affects the package @yaireo/tagify before 4.9.8. The package is used for rendering UI components inside the input or text fields, and an attacker can pass a malicious placeholder value to it to fire the XSS payload.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://snyk.io/vuln/SNYK-JS-YAIREOTAGIFY-2404358 | third party advisory |
https://github.com/yairEO/tagify/issues/988 | issue tracking exploit third party advisory |
https://github.com/yairEO/tagify/releases/tag/v4.9.8 | third party advisory release notes |
https://github.com/yairEO/tagify/commit/198c0451fad188390390395ccfc84ab371def4c7 | third party advisory patch |
https://bsg.tech/blog/cve-2022-25854-stored-xss-in-yaireo-tagify-npm-module/ | exploit third party advisory patch |