Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-37695
HistoryAug 12, 2021 - 11:10 p.m.

CVE-2021-37695 Execution of JavaScript code using malformed HTML in ckeditor

2021-08-1223:10:10
CWE-79
GitHub_M
www.cve.org
1

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

6.7 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

61.1%

ckeditor is an open source WYSIWYG HTML editor with rich content support. A potential vulnerability has been discovered in CKEditor 4 Fake Objects package. The vulnerability allowed to inject malformed Fake Objects HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at version < 4.16.2. The problem has been recognized and patched. The fix will be available in version 4.16.2.

CNA Affected

[
  {
    "product": "ckeditor4",
    "vendor": "ckeditor",
    "versions": [
      {
        "status": "affected",
        "version": "< 4.16.2"
      }
    ]
  }
]

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

6.7 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

61.1%