| 0 |
| url |
VCID-17pr-6guy-53ge |
| vulnerability_id |
VCID-17pr-6guy-53ge |
| summary |
Cross-site Scripting
ckeditor is an open source WYSIWYG HTML editor with rich content support. A vulnerability has been discovered in the clipboard Widget plugin if used alongside the undo feature. The vulnerability allows a user to abuse undo functionality using malformed widget HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at The problem has been recognized and patched. The fix will be available |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-32808 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01368 |
| scoring_system |
epss |
| scoring_elements |
0.80236 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01368 |
| scoring_system |
epss |
| scoring_elements |
0.80267 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.01368 |
| scoring_system |
epss |
| scoring_elements |
0.80241 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.01368 |
| scoring_system |
epss |
| scoring_elements |
0.80238 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.01368 |
| scoring_system |
epss |
| scoring_elements |
0.80156 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.01368 |
| scoring_system |
epss |
| scoring_elements |
0.80163 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.01368 |
| scoring_system |
epss |
| scoring_elements |
0.80182 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.01368 |
| scoring_system |
epss |
| scoring_elements |
0.80171 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.01368 |
| scoring_system |
epss |
| scoring_elements |
0.80199 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.01368 |
| scoring_system |
epss |
| scoring_elements |
0.80208 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01368 |
| scoring_system |
epss |
| scoring_elements |
0.80227 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.01368 |
| scoring_system |
epss |
| scoring_elements |
0.80213 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-32808 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-32808, GHSA-6226-h7ff-ch6c
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-17pr-6guy-53ge |
|
| 1 |
| url |
VCID-3htn-j487-3ydn |
| vulnerability_id |
VCID-3htn-j487-3ydn |
| summary |
Cross-site scripting (XSS) in the CKEditor 5 real-time collaboration package
### Impact
During a recent internal audit, we identified a Cross-Site Scripting (XSS) vulnerability in the CKEditor 5 real-time collaboration package. This vulnerability can lead to unauthorized JavaScript code execution and affects user markers, which represent users' positions within the document.
This vulnerability affects only installations with [Real-time collaborative editing](https://ckeditor.com/docs/ckeditor5/latest/features/collaboration/real-time-collaboration/real-time-collaboration.html) enabled.
### Patches
The problem has been recognized and patched. The fix will be available in version 44.2.1 (and above).
### For more information
Email us at [security@cksource.com](mailto:security@cksource.com) if you have any questions or comments about this advisory. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-25299 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57327 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57311 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57376 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57381 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57355 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57375 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57395 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.5738 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57378 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00413 |
| scoring_system |
epss |
| scoring_elements |
0.6147 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00413 |
| scoring_system |
epss |
| scoring_elements |
0.61498 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-25299 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-25299, GHSA-j3mm-wmfm-mwvh
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3htn-j487-3ydn |
|
| 2 |
| url |
VCID-4x92-vapt-n7dz |
| vulnerability_id |
VCID-4x92-vapt-n7dz |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CKEditor4 is an open source WYSIWYG HTML editor. The vulnerability allowed to inject malformed comments HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at The problem has been recognized and patched. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-41165 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30422 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.3026 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30321 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30478 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30364 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30384 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30366 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30415 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30506 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30552 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30362 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30459 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30456 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-41165 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-41165, GHSA-7h26-63m7-qhf2
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4x92-vapt-n7dz |
|
| 3 |
| url |
VCID-8hvk-a5es-v3e4 |
| vulnerability_id |
VCID-8hvk-a5es-v3e4 |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CKEditor4 is an open source WYSIWYG HTML editor. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-41164 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22953 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22647 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22811 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22851 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22857 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22843 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.229 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22936 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22916 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22863 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22789 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22997 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22783 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-41164 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-41164, GHSA-pvmx-g8h5-cprj
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8hvk-a5es-v3e4 |
|
| 4 |
| url |
VCID-c8r2-wpf3-47f9 |
| vulnerability_id |
VCID-c8r2-wpf3-47f9 |
| summary |
CKEditor 4 ReDoS Vulnerability
It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted text into the Styles input of specific dialogs (in the Advanced Tab for Dialogs plugin). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-26271 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.70015 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69867 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69879 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69894 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69871 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69919 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69935 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69959 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69943 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69929 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69972 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69982 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69964 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-26271 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-26271, GHSA-jv4c-7jqq-m34x
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c8r2-wpf3-47f9 |
|
| 5 |
| url |
VCID-h5zz-wz8f-2uf6 |
| vulnerability_id |
VCID-h5zz-wz8f-2uf6 |
| summary |
Inclusion of Functionality from Untrusted Control Sphere in CKEditor 4
It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-26272 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.65943 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.66077 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.66056 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.66068 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.66054 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.66018 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.66049 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.66061 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.66042 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.6603 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.6598 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.66014 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.65985 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-26272 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-26272, GHSA-wpvm-wqr4-p7cw
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h5zz-wz8f-2uf6 |
|
| 6 |
| url |
VCID-k7qp-c6vp-sqbg |
| vulnerability_id |
VCID-k7qp-c6vp-sqbg |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A cross-site scripting vulnerability has been discovered affecting Iframe Dialog and Media Embed packages. The vulnerability may trigger a JavaScript code after fulfilling special conditions: using one of the affected packages on a web page with missing proper Content Security Policy configuration; initializing the editor on an element and using an element other than `<textarea>` as a base; and destroying the editor instance. This vulnerability might affect a small percentage of integrators that depend on dynamic editor initialization/destroy mechanism. A fix is available in CKEditor4 version 4.21.0. In some rare cases, a security fix may be considered a breaking change. Starting from version 4.21.0, the Iframe Dialog plugin applies the `sandbox` attribute by default, which restricts JavaScript code execution in the iframe element. To change this behavior, configure the `config.iframe_attributes` option. Also starting from version 4.21.0, the Media Embed plugin regenerates the entire content of the embed widget by default. To change this behavior, configure the `config.embed_keepOriginalContent` option. Those who choose to enable either of the more permissive options or who cannot upgrade to a patched version should properly configure Content Security Policy to avoid any potential security issues that may arise from embedding iframe elements on their web page. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28439 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54139 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.5411 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54166 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54115 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58169 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58221 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58238 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58214 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58194 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58226 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58229 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58204 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28439 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-28439, GHSA-vh5c-xwqv-cv9g
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k7qp-c6vp-sqbg |
|
| 7 |
| url |
VCID-qb4j-9tz7-m7a2 |
| vulnerability_id |
VCID-qb4j-9tz7-m7a2 |
| summary |
Cross-site Scripting
CKEditor allows user-assisted XSS involving a source-mode paste. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-17960 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83777 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83833 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83808 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83806 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83773 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83706 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.8372 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83734 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83737 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83761 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83767 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83783 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-17960 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-17960, GHSA-g68x-vvqq-pvw3
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qb4j-9tz7-m7a2 |
|
| 8 |
| url |
VCID-s8u8-xbdk-87dj |
| vulnerability_id |
VCID-s8u8-xbdk-87dj |
| summary |
ckeditor4 vulnerable to cross-site scripting
A cross-site scripting (XSS) vulnerability in the HTML Data Processor in CKEditor 4 4.14.0 through 4.16.x before 4.16.1 allows remote attackers to inject executable JavaScript code through a crafted comment because `--!>` is mishandled. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-33829 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.49674 |
| scoring_system |
epss |
| scoring_elements |
0.9779 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.49674 |
| scoring_system |
epss |
| scoring_elements |
0.97813 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.49674 |
| scoring_system |
epss |
| scoring_elements |
0.97814 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.49674 |
| scoring_system |
epss |
| scoring_elements |
0.97812 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.49674 |
| scoring_system |
epss |
| scoring_elements |
0.97806 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.49674 |
| scoring_system |
epss |
| scoring_elements |
0.97805 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.49674 |
| scoring_system |
epss |
| scoring_elements |
0.97803 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.49674 |
| scoring_system |
epss |
| scoring_elements |
0.97782 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.49674 |
| scoring_system |
epss |
| scoring_elements |
0.97788 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.49674 |
| scoring_system |
epss |
| scoring_elements |
0.978 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.49674 |
| scoring_system |
epss |
| scoring_elements |
0.97797 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.49674 |
| scoring_system |
epss |
| scoring_elements |
0.97793 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-33829 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-33829, GHSA-rgx6-rjj4-c388
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s8u8-xbdk-87dj |
|
| 9 |
| url |
VCID-sd2a-hmu2-wbax |
| vulnerability_id |
VCID-sd2a-hmu2-wbax |
| summary |
Code Injection
ckeditor is an open source WYSIWYG HTML editor with rich content support. A potential vulnerability has been discovered in CKEdit The vulnerability allowed to abuse paste functionality using malformed HTML, which could result in injecting arbitrary HTML into the editor. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-32809 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46584 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46637 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.4664 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46583 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46566 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55175 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55176 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.552 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55217 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55075 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55236 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55224 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-32809 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-32809, GHSA-7889-rm5j-hpgg
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sd2a-hmu2-wbax |
|
| 10 |
| url |
VCID-tkcr-ecev-k3af |
| vulnerability_id |
VCID-tkcr-ecev-k3af |
| summary |
The Preview plugin in CKEditor allows Cross-site scripting (XSS)
Cross-site scripting (XSS) vulnerability in the Preview plugin before 4.4.3 in CKEditor allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5191 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.53045 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.53063 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.53056 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.53018 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.5294 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.53035 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52965 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.53051 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52989 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52957 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.53002 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.53008 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.53011 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5191 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-5191, GHSA-v27h-j97p-wqmx
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tkcr-ecev-k3af |
|
| 11 |
| url |
VCID-un66-k85j-b7d2 |
| vulnerability_id |
VCID-un66-k85j-b7d2 |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4 prior to version 4.18.0. The vulnerability allows someone to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. This problem has been patched in version 4.18.0. There are currently no known workarounds. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-24728 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73981 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73937 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73962 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73933 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73967 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73978 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73986 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.74004 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01069 |
| scoring_system |
epss |
| scoring_elements |
0.77781 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.01069 |
| scoring_system |
epss |
| scoring_elements |
0.77748 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.01069 |
| scoring_system |
epss |
| scoring_elements |
0.77755 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01069 |
| scoring_system |
epss |
| scoring_elements |
0.77756 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-24728 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://www.drupal.org/sa-core-2022-005 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:08:59Z/ |
|
|
| url |
https://www.drupal.org/sa-core-2022-005 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-24728, GHSA-4fc4-4p5g-6w89
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-un66-k85j-b7d2 |
|
| 12 |
| url |
VCID-usbf-pmfq-1fb6 |
| vulnerability_id |
VCID-usbf-pmfq-1fb6 |
| summary |
Cross-site scripting (XSS) in the clipboard package
### Impact
During a recent internal audit, we identified a Cross-Site Scripting (XSS) vulnerability in the CKEditor 5 clipboard package. This vulnerability could be triggered by a specific user action, leading to unauthorized JavaScript code execution, if the attacker managed to insert a malicious content into the editor, which might happen with a very specific editor configuration.
This vulnerability affects **only** installations where the editor configuration meets the following criteria:
1. The [**Block Toolbar**](https://ckeditor.com/docs/ckeditor5/latest/getting-started/setup/toolbar.html#block-toolbar) plugin is enabled.
1. One of the following plugins is also enabled:
- [**General HTML Support**](https://ckeditor.com/docs/ckeditor5/latest/features/html/general-html-support.html) with a configuration that permits unsafe markup.
- [**HTML Embed**](https://ckeditor.com/docs/ckeditor5/latest/features/html/html-embed.html).
### Patches
The problem has been recognized and patched. The fix will be available in version 43.1.1 (and above), and explicitly in version 41.3.2.
### Workarounds
It's highly recommended to update to the version 43.1.1 or higher. However, if the update is not an option, we recommend disabling the block toolbar plugin.
### For more information
Email us at [security@cksource.com](mailto:security@cksource.com) if you have any questions or comments about this advisory. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-45613 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50733 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50743 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50794 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50815 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50786 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50809 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50766 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.5077 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50714 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50758 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-45613 |
|
| 1 |
| reference_url |
https://github.com/ckeditor/ckeditor5 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
5.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ckeditor/ckeditor5 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-45613, GHSA-rgg8-g5x8-wr9v
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-usbf-pmfq-1fb6 |
|
| 13 |
| url |
VCID-vj35-jtgq-8qbv |
| vulnerability_id |
VCID-vj35-jtgq-8qbv |
| summary |
Cross-site Scripting
ckeditor is an open source WYSIWYG HTML editor with rich content support. A potential vulnerability has been discovered in CKEdit The vulnerability allowed to inject malformed Fake Objects HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at The problem has been recognized and patched. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-37695 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72945 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72989 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72948 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72955 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72849 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72856 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72876 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72851 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72889 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72903 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72928 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72911 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72904 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-37695 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-37695, GHSA-m94c-37g6-cjhc
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vj35-jtgq-8qbv |
|
| 14 |
| url |
VCID-xhp7-kqdk-tfeu |
| vulnerability_id |
VCID-xhp7-kqdk-tfeu |
| summary |
Improper Input Validation
CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. CKEditor4 prior to version 4.18.0 contains a vulnerability in the `dialog` plugin. The vulnerability allows abuse of a dialog input validator regular expression, which can cause a significant performance drop resulting in a browser tab freeze. A patch is available in version 4.18.0. There are currently no known workarounds. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-24729 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00845 |
| scoring_system |
epss |
| scoring_elements |
0.74813 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00845 |
| scoring_system |
epss |
| scoring_elements |
0.74849 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00857 |
| scoring_system |
epss |
| scoring_elements |
0.74949 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00857 |
| scoring_system |
epss |
| scoring_elements |
0.74983 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00857 |
| scoring_system |
epss |
| scoring_elements |
0.74995 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00857 |
| scoring_system |
epss |
| scoring_elements |
0.75017 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00857 |
| scoring_system |
epss |
| scoring_elements |
0.74944 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00857 |
| scoring_system |
epss |
| scoring_elements |
0.74986 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00857 |
| scoring_system |
epss |
| scoring_elements |
0.75022 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00857 |
| scoring_system |
epss |
| scoring_elements |
0.75029 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00857 |
| scoring_system |
epss |
| scoring_elements |
0.74996 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00857 |
| scoring_system |
epss |
| scoring_elements |
0.74973 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-24729 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-24729, GHSA-f6rf-9m92-x2hh
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xhp7-kqdk-tfeu |
|