ckeditor4-dev@4.13.1 vulnerabilities

The development version of CKEditor - JavaScript WYSIWYG web text editor.

Direct Vulnerabilities

Known vulnerabilities in the ckeditor4-dev package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Regular Expression Denial of Service (ReDoS)

ckeditor4-dev is a configurable WYSIWYG HTML editor.

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin).

How to fix Regular Expression Denial of Service (ReDoS)?

Upgrade ckeditor4-dev to version 4.16.0 or higher.

<4.16.0
  • H
Cross-site Scripting (XSS)

ckeditor4-dev is a configurable WYSIWYG HTML editor.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) by persuading a victim to paste a specially crafted HTML code into the Color Button dialog.

How to fix Cross-site Scripting (XSS)?

Upgrade ckeditor4-dev to version 4.15.1 or higher.

<4.15.1
  • M
Cross-site Scripting (XSS)

ckeditor4-dev is a configurable WYSIWYG HTML editor.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the HTML Data Processor. It allows remote attackers to inject arbitrary web script through a crafted "protected" comment (with the cke_protected syntax).

How to fix Cross-site Scripting (XSS)?

Upgrade ckeditor4-dev to version 4.14.0 or higher.

<4.14.0