6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
7.1 High
AI Score
Confidence
High
0.0005 Low
EPSS
Percentile
17.1%
The vulnerability has been discovered in the AJAX sample available at the samples/old/ajax.html
file location. All integrators that use that sample in the production code can be affected.
A potential vulnerability has been discovered in one of CKEditor’s 4 samples that are shipped with production code. The vulnerability allowed to execute JavaScript code by abusing the AJAX sample. It affects all users using the CKEditor 4 at version < 4.24.0-lts where samples/old/ajax.html
is used in a production environment.
The problem has been recognized and patched. The fix will be available in version 4.24.0-lts.
Email us at [email protected] if you have any questions or comments about this advisory.
The CKEditor 4 team would like to thank Rafael Pedrero and INCIBE (original report) for recognizing and reporting this vulnerability.
CPE | Name | Operator | Version |
---|---|---|---|
ckeditor4 | lt | 4.24.0-lts |
github.com/advisories/GHSA-wh5w-82f3-wrxh
github.com/ckeditor/ckeditor4/commit/8ed1a3c93d0ae5f49f4ecff5738ab8a2972194cb
github.com/ckeditor/ckeditor4/security/advisories/GHSA-wh5w-82f3-wrxh
nvd.nist.gov/vuln/detail/CVE-2023-4771
www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-vulnerability-cksource-ckeditor
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
7.1 High
AI Score
Confidence
High
0.0005 Low
EPSS
Percentile
17.1%