HomeCkeditorCVE-2021-26272

CVE-2021-26272

MEDIUM
6.5CVSS
Published: 2021-01-26
Updated: 2024-11-21
AI Analysis

Description

It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin).

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Attack Vector
network
Complexity
low
Privileges
none
User Action
required
Scope
unchanged
Confidentiality
none
Integrity
none
Availability
high
Weaknesses
CWE-829

Metadata

Primary Vendor
CKEDITOR
Published
1/26/2021
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

ckeditor : ckeditororacle : agile_plmoracle : agile_plmoracle : application_expressoracle : banking_party_managementoracle : commerce_merchandisingoracle : commerce_merchandisingoracle : commerce_merchandisingoracle : financial_services_analytical_applications_infrastructureoracle : financial_services_analytical_applications_infrastructureoracle : financial_services_analytical_applications_infrastructureoracle : financial_services_model_management_and_governanceoracle : jd_edwards_enterpriseone_toolsoracle : siebel_ui_frameworkoracle : webcenter_sitesoracle : webcenter_sites

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2021-26272 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com