It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin).

Project Subscriptions

Vendors Products
Ckeditor Subscribe
Ckeditor Subscribe
Agile Plm Subscribe
Application Express Subscribe
Banking Party Management Subscribe
Commerce Merchandising Subscribe
Financial Services Analytical Applications Infrastructure Subscribe
Financial Services Model Management And Governance Subscribe
Jd Edwards Enterpriseone Tools Subscribe
Siebel Ui Framework Subscribe
Webcenter Sites Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-2267 It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin).
Github GHSA Github GHSA GHSA-wpvm-wqr4-p7cw Inclusion of Functionality from Untrusted Control Sphere in CKEditor 4
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T20:19:20.393Z

Reserved: 2021-01-26T00:00:00

Link: CVE-2021-26272

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-01-26T21:15:12.923

Modified: 2024-11-21T05:56:00.900

Link: CVE-2021-26272

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses