Description
It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin).
Published: 2021-01-26
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-2267 It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin).
Github GHSA Github GHSA GHSA-wpvm-wqr4-p7cw Inclusion of Functionality from Untrusted Control Sphere in CKEditor 4
History

No history.

Subscriptions

Ckeditor Ckeditor
Oracle Agile Plm Application Express Banking Party Management Commerce Merchandising Financial Services Analytical Applications Infrastructure Financial Services Model Management And Governance Jd Edwards Enterpriseone Tools Siebel Ui Framework Webcenter Sites
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T20:19:20.393Z

Reserved: 2021-01-26T00:00:00.000Z

Link: CVE-2021-26272

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-01-26T21:15:12.923

Modified: 2024-11-21T05:56:00.900

Link: CVE-2021-26272

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses