Description
Editor.js is a block-style editor with clean JSON output. Versions prior to 2.26.0 are vulnerable to Code Injection via pasted input. The processHTML method passes pasted input into wrapper’s innerHTML. This issue is patched in version 2.26.0.
Published: 2022-12-15
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-2515 Editor.js is a block-style editor with clean JSON output. Versions prior to 2.26.0 are vulnerable to Code Injection via pasted input. The processHTML method passes pasted input into wrapper’s innerHTML. This issue is patched in version 2.26.0.
Github GHSA Github GHSA GHSA-6mvj-2569-3mcm Editor.js vulnerable to Code Injection
History

Thu, 17 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-04-17T18:14:12.107Z

Reserved: 2022-01-19T21:23:53.757Z

Link: CVE-2022-23474

cve-icon Vulnrichment

Updated: 2024-08-03T03:43:46.063Z

cve-icon NVD

Status : Modified

Published: 2022-12-15T19:15:16.613

Modified: 2024-11-21T06:48:38.147

Link: CVE-2022-23474

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses