Search for vulnerabilities
| Vulnerability ID | VCID-3ujy-25y6-kqea |
| Aliases |
GHSA-v273-j5hq-26xp
|
| Summary | Drupal core uses a vulnerable Third-party library CKEditor The Drupal project uses the third-party library [CKEditor](https://github.com/ckeditor/ckeditor4), which has released a [security improvement](https://ckeditor.com/blog/CKEditor-4.14-with-Paste-from-LibreOffice-released/#security-issues-fixed) that is needed to protect some Drupal configurations. Vulnerabilities are possible if Drupal is configured to use the WYSIWYG CKEditor for your site's users. An attacker that can create or edit content may be able to exploit this Cross Site Scripting (XSS) vulnerability to target users with access to the WYSIWYG CKEditor, and this may include site admins with privileged access. The latest versions of Drupal update CKEditor to 4.14 to mitigate the vulnerabilities. |
| Status | Published |
| Exploitability | 0.5 |
| Weighted Severity | 6.2 |
| Risk | 3.1 |
| Affected and Fixed Packages | Package Details |
| System | Score | Found at |
|---|---|---|
| cvssv3.1_qr | MODERATE | https://github.com/advisories/GHSA-v273-j5hq-26xp |
| cvssv3.1 | 4.2 | https://github.com/drupal/core |
| generic_textual | MODERATE | https://github.com/drupal/core |
| cvssv3.1 | 4.2 | https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/2020-03-18.yaml |
| generic_textual | MODERATE | https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/2020-03-18.yaml |
| cvssv3.1 | 4.2 | https://www.drupal.org/sa-core-2020-001 |
| generic_textual | MODERATE | https://www.drupal.org/sa-core-2020-001 |
| Reference id | Reference type | URL |
|---|---|---|
| https://github.com/drupal/core | ||
| https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/2020-03-18.yaml | ||
| https://www.drupal.org/sa-core-2020-001 | ||
| GHSA-v273-j5hq-26xp | https://github.com/advisories/GHSA-v273-j5hq-26xp |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
No EPSS data available for this vulnerability.
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2025-07-31T08:35:44.018196+00:00 | GithubOSV Importer | Import | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-v273-j5hq-26xp/GHSA-v273-j5hq-26xp.json | 37.0.0 |