Versions of the package quill-mention before 4.0.0 are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization, via the renderList function.
**Note:**
If the mentions list is sourced from unsafe (user-sourced) data, this might allow an injection attack when a Quill user hits @.
**Note:**
If the mentions list is sourced from unsafe (user-sourced) data, this might allow an injection attack when a Quill user hits @.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 23 Sep 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-23T19:01:41.735Z
Reserved: 2023-02-20T10:28:48.929Z
Link: CVE-2023-26149

Updated: 2024-08-02T11:39:06.638Z

Status : Modified
Published: 2023-09-28T05:15:46.023
Modified: 2024-11-21T07:50:52.863
Link: CVE-2023-26149

No data.

No data.