Description
SCEditor is a lightweight WYSIWYG BBCode and XHTML editor. Prior to 3.2.1, if an attacker has the ability control configuration options passed to sceditor.create(), like emoticons, charset, etc. then it's possible for them to trigger an XSS attack due to lack of sanitisation of configuration options. This vulnerability is fixed in 3.2.1.
Published: 2026-02-06
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (DOM XSS) via unsanitised editor configuration
Action: Patch
AI Analysis

Impact

SCEditor, a lightweight WYSIWYG editor, has an unchecked configuration option vulnerability that allows an attacker who can influence the options passed to sceditor.create() to inject arbitrary HTML or script via emoticon URLs. The lack of sanitisation means the injected content is rendered directly into the page, enabling a DOM‑based cross‑site scripting attack that can execute malicious JavaScript in the victim’s browser. This flaw is classified as a CWE‑79 injection issue and can lead to theft of session cookies, credential leakage, or arbitrary actions performed on behalf of the user.

Affected Systems

Any deployment of SCEditor older than version 3.2.1 is susceptible, especially installations where configuration parameters such as emoticons, charset, or other settings can be modified by an attacker or derived from untrusted input. The flaw exists in all publicly released releases prior to the 3.2.1 update.

Risk and Exploitability

The vulnerability scores moderately (CVSS 5.4), and the EPSS indicates a very low probability of exploitation (<1%). It is not listed in the CISA KEV catalogue. Successful exploitation requires the attacker to have the ability to supply or alter the editor configuration; if such control is possible, they can trigger the XSS by embedding malicious script in a configuration value. Once triggered in the victim’s browser, the attacker can perform any action the page’s context allows.

Generated by OpenCVE AI on April 17, 2026 at 22:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to SCEditor 3.2.1 or later to eliminate the unsanitised input issue.
  • If upgrading is not viable, sanitize or validate all configuration values before passing them to sceditor.create(), stripping or encoding any HTML or script payloads.
  • Restrict configuration changes to trusted administrators and remove or disable emoticon or custom configuration features when not required.

Generated by OpenCVE AI on April 17, 2026 at 22:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-25fq-6qgg-qpj8 SCEditor has DOM XSS via emoticon URL/HTML injection
History

Thu, 19 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Sceditor
Sceditor sceditor
CPEs cpe:2.3:a:sceditor:sceditor:*:*:*:*:*:*:*:*
Vendors & Products Sceditor
Sceditor sceditor

Mon, 09 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Samclarke
Samclarke sceditor
Vendors & Products Samclarke
Samclarke sceditor

Fri, 06 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Description SCEditor is a lightweight WYSIWYG BBCode and XHTML editor. Prior to 3.2.1, if an attacker has the ability control configuration options passed to sceditor.create(), like emoticons, charset, etc. then it's possible for them to trigger an XSS attack due to lack of sanitisation of configuration options. This vulnerability is fixed in 3.2.1.
Title SCEditor affected by DOM XSS via emoticon URL/HTML injection
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Samclarke Sceditor
Sceditor Sceditor
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-09T15:27:43.193Z

Reserved: 2026-02-03T01:02:46.715Z

Link: CVE-2026-25581

cve-icon Vulnrichment

Updated: 2026-02-09T15:19:24.793Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-06T21:16:17.307

Modified: 2026-02-19T17:23:19.897

Link: CVE-2026-25581

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:30:29Z

Weaknesses