The vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4.
A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.18.0.
The problem has been recognized and patched. The fix will be available in version 4.18.0.
Email us at [email protected] if you have any questions or comments about this advisory.
The CKEditor 4 team would like to thank GHSL team member Kevin Backhouse (@kevinbackhouse) for recognizing and reporting this vulnerability.
ckeditor.com/cke4/release/CKEditor-4.18.0
github.com/ckeditor/ckeditor4
github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949
github.com/ckeditor/ckeditor4/security/advisories/GHSA-4fc4-4p5g-6w89
lists.fedoraproject.org/archives/list/[email protected]/message/VR76VBN5GW5QUBJFHVXRX36UZ6YTCMW6
lists.fedoraproject.org/archives/list/[email protected]/message/WOZGMCYDB2OKKULFXZKM6V7JJW4ZZHJP
nvd.nist.gov/vuln/detail/CVE-2022-24728
securitylab.github.com/advisories/GHSL-2022-009_ckeditor4
www.drupal.org/sa-core-2022-005
www.oracle.com/security-alerts/cpujul2022.html