GHSA-6v96-m24v-f58j

Suggest an improvement
Source
https://github.com/advisories/GHSA-6v96-m24v-f58j
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/08/GHSA-6v96-m24v-f58j/GHSA-6v96-m24v-f58j.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-6v96-m24v-f58j
Aliases
Published
2024-08-21T18:31:00Z
Modified
2024-11-18T16:27:06Z
Severity
  • 3.1 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N CVSS Calculator
  • 4.8 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N CVSS Calculator
Summary
CKEditor4 low-risk cross-site scripting (XSS) vulnerability linked to potential domain takeover
Details

Affected Packages

The issue impacts only editor instances with enabled version notifications.

Please note that this feature is disabled by default in all CKEditor 4 LTS versions. Therefore, if you use CKEditor 4 LTS, it is highly unlikely that you are affected by this vulnerability. If you are unsure, please contact us.

Impact

A theoretical vulnerability has been identified in CKEditor 4.22 (and above). In a highly unlikely scenario where an attacker gains control over the https://cke4.ckeditor.com domain, they could potentially execute an attack on CKEditor 4 instances. Although the vulnerability is purely hypothetical, we have addressed it in CKEditor 4.25.0-lts to ensure compliance with security best practices.

Patches

The issue has been recognized and patched. The fix is available in version 4.25.0-lts.

For More Information

If you have any questions or comments about this advisory, please email us at security@cksource.com.

Database specific
{
    "nvd_published_at": "2024-08-21T16:15:08Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-08-21T18:31:00Z"
}
References

Affected packages

npm / ckeditor4

Package

Affected ranges

Type
SEMVER
Events
Introduced
4.22.0
Fixed
4.25.0