ckeditor4-dev@4.13.1 vulnerabilities

The development version of CKEditor - JavaScript WYSIWYG web text editor.

  • latest version

    4.16.0

  • latest non vulnerable version

  • first published

    5 years ago

  • latest version published

    3 years ago

  • deprecated

    Package is deprecated

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the ckeditor4-dev package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Regular Expression Denial of Service (ReDoS)

    ckeditor4-dev is a configurable WYSIWYG HTML editor.

    Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin).

    How to fix Regular Expression Denial of Service (ReDoS)?

    Upgrade ckeditor4-dev to version 4.16.0 or higher.

    <4.16.0
    • H
    Cross-site Scripting (XSS)

    ckeditor4-dev is a configurable WYSIWYG HTML editor.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) by persuading a victim to paste a specially crafted HTML code into the Color Button dialog.

    How to fix Cross-site Scripting (XSS)?

    Upgrade ckeditor4-dev to version 4.15.1 or higher.

    <4.15.1
    • M
    Cross-site Scripting (XSS)

    ckeditor4-dev is a configurable WYSIWYG HTML editor.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the HTML Data Processor. It allows remote attackers to inject arbitrary web script through a crafted "protected" comment (with the cke_protected syntax).

    How to fix Cross-site Scripting (XSS)?

    Upgrade ckeditor4-dev to version 4.14.0 or higher.

    <4.14.0