GHSA-cr56-66mx-293v

Suggest an improvement
Source
https://github.com/advisories/GHSA-cr56-66mx-293v
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/09/GHSA-cr56-66mx-293v/GHSA-cr56-66mx-293v.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-cr56-66mx-293v
Published
2020-09-03T15:53:50Z
Modified
2021-10-04T21:12:14Z
Summary
Cross-Site Scripting in @toast-ui/editor
Details

Versions of @toast-ui/editor prior to 2.2.0 are vulnerable to Cross-Site Scripting (XSS). There are multiple bypasses to the package's built-in XSS sanitization. This may allow attackers to execute arbitrary JavaScript on a victim's browser.

Recommendation

Upgrade to version 2.2.0 or later.

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2020-08-31T19:02:06Z",
    "severity": "HIGH",
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

npm / @toast-ui/editor

Package

Name
@toast-ui/editor
View open source insights on deps.dev
Purl
pkg:npm/%40toast-ui/editor

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.0

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/09/GHSA-cr56-66mx-293v/GHSA-cr56-66mx-293v.json"