HomeCkeditorCVE-2021-37695

CVE-2021-37695

HIGH
7.3CVSS
Published: 2021-08-13
Updated: 2024-11-21
AI Analysis

Description

ckeditor is an open source WYSIWYG HTML editor with rich content support. A potential vulnerability has been discovered in CKEditor 4 [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) package. The vulnerability allowed to inject malformed Fake Objects HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at version < 4.16.2. The problem has been recognized and patched. The fix will be available in version 4.16.2.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Attack Vector
network
Complexity
low
Privileges
low
User Action
required
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
none
Weaknesses
CWE-79CWE-79

Metadata

Primary Vendor
CKEDITOR
Published
8/13/2021
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

ckeditor : ckeditordebian : debian_linuxfedoraproject : fedorafedoraproject : fedorafedoraproject : fedoraoracle : application_expressoracle : banking_party_managementoracle : commerce_guided_searchoracle : commerce_merchandisingoracle : documakeroracle : documakeroracle : financial_services_analytical_applications_infrastructureoracle : financial_services_analytical_applications_infrastructureoracle : financial_services_model_management_and_governanceoracle : jd_edwards_enterpriseone_toolsoracle : peoplesoft_enterprise_peopletoolsoracle : peoplesoft_enterprise_peopletoolsoracle : peoplesoft_enterprise_peopletools

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2021-37695 | HIGH Severity | CVEDatabase.com | CVEDatabase.com