GHSA-h236-g5gh-vq6c

Suggest an improvement
Source
https://github.com/advisories/GHSA-h236-g5gh-vq6c
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-h236-g5gh-vq6c/GHSA-h236-g5gh-vq6c.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-h236-g5gh-vq6c
Aliases
Published
2022-02-10T23:32:51Z
Modified
2023-11-08T04:01:29.960993Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
DOM-based cross-site scripting in Froala Editor
Details

Froala WYSIWYG HTML Editor is a lightweight WYSIWYG HTML Editor written in JavaScript that enables rich text editing capabilities for web applications. A DOM-based cross-site scripting (XSS) vulnerability exists in versions before 3.2.3 because HTML code in the editor is not correctly sanitized when inserted into the DOM. This allows an attacker that can control the editor content to execute arbitrary JavaScript in the context of the victim’s session.

Database specific
{
    "nvd_published_at": "2020-07-07T16:15:00Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2021-05-11T17:34:13Z"
}
References

Affected packages

npm / froala-editor

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.3