CVE-2023-26123

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-26123
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-26123.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-26123
Published
2023-04-14T05:15:13Z
Modified
2025-02-06T23:51:31.361173Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Versions of the package raysan5/raylib before 4.5.0 are vulnerable to Cross-site Scripting (XSS) such that the SetClipboardText API does not properly escape the ' character, allowing attacker-controlled input to break out of the string and execute arbitrary JavaScript via emscriptenrunscript function.

Note: This vulnerability is present only when compiling raylib for PLATFORM_WEB. All the other Desktop/Mobile/Embedded platforms are not affected.

References

Affected packages

Git / github.com/raysan5/raylib

Affected ranges

Type
GIT
Repo
https://github.com/raysan5/raylib
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*

1.0.4
1.0.6
1.1.1
1.2.2
1.3.0
1.4.0
1.5.0
1.6.0
1.7.0
1.8.0
1.9.4-dev
1.9.7-dev

2.*

2.0.0
2.5.0
2.6.0

3.*

3.0.0
3.5.0
3.7.0

4.*

4.0.0
4.2.0