Skip to content

CKEditor cross-site scripting vulnerability in AJAX sample

Moderate severity GitHub Reviewed Published Feb 7, 2024 in ckeditor/ckeditor4 • Updated Feb 7, 2024

Package

npm ckeditor4 (npm)

Affected versions

< 4.24.0-lts

Patched versions

4.24.0-lts

Description

Affected packages

The vulnerability has been discovered in the AJAX sample available at the samples/old/ajax.html file location. All integrators that use that sample in the production code can be affected.

Impact

A potential vulnerability has been discovered in one of CKEditor's 4 samples that are shipped with production code. The vulnerability allowed to execute JavaScript code by abusing the AJAX sample. It affects all users using the CKEditor 4 at version < 4.24.0-lts where samples/old/ajax.html is used in a production environment.

Patches

The problem has been recognized and patched. The fix will be available in version 4.24.0-lts.

For more information

Email us at security@cksource.com if you have any questions or comments about this advisory.

Acknowledgements

The CKEditor 4 team would like to thank Rafael Pedrero and INCIBE (original report) for recognizing and reporting this vulnerability.

References

@jacekbogdanski jacekbogdanski published to ckeditor/ckeditor4 Feb 7, 2024
Published to the GitHub Advisory Database Feb 7, 2024
Reviewed Feb 7, 2024
Last updated Feb 7, 2024

Severity

Moderate
6.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Weaknesses

CVE ID

CVE-2023-4771

GHSA ID

GHSA-wh5w-82f3-wrxh

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.