Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-4x92-vapt-n7dz
Vulnerability ID VCID-4x92-vapt-n7dz
Aliases CVE-2021-41165
GHSA-7h26-63m7-qhf2
Summary Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CKEditor4 is an open source WYSIWYG HTML editor. The vulnerability allowed to inject malformed comments HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at The problem has been recognized and patched.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
epss 0.00117 https://api.first.org/data/v1/epss?cve=CVE-2021-41165
epss 0.00117 https://api.first.org/data/v1/epss?cve=CVE-2021-41165
epss 0.00117 https://api.first.org/data/v1/epss?cve=CVE-2021-41165
epss 0.00117 https://api.first.org/data/v1/epss?cve=CVE-2021-41165
epss 0.00117 https://api.first.org/data/v1/epss?cve=CVE-2021-41165
epss 0.00117 https://api.first.org/data/v1/epss?cve=CVE-2021-41165
epss 0.00117 https://api.first.org/data/v1/epss?cve=CVE-2021-41165
epss 0.00117 https://api.first.org/data/v1/epss?cve=CVE-2021-41165
epss 0.00117 https://api.first.org/data/v1/epss?cve=CVE-2021-41165
epss 0.00117 https://api.first.org/data/v1/epss?cve=CVE-2021-41165
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-7h26-63m7-qhf2
cvssv3.1 8.2 https://github.com/ckeditor/ckeditor4
generic_textual HIGH https://github.com/ckeditor/ckeditor4
cvssv3.1 8.2 https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-417
generic_textual HIGH https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-417
cvssv3 8.2 https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7h26-63m7-qhf2
cvssv3.1 8.2 https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7h26-63m7-qhf2
cvssv3.1_qr HIGH https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7h26-63m7-qhf2
generic_textual HIGH https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7h26-63m7-qhf2
cvssv3.1 8.2 https://nvd.nist.gov/vuln/detail/CVE-2021-41165
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2021-41165
archlinux Medium https://security.archlinux.org/AVG-2565
cvssv3.1 8.2 https://www.drupal.org/sa-core-2021-011
generic_textual HIGH https://www.drupal.org/sa-core-2021-011
cvssv3.1 8.2 https://www.oracle.com/security-alerts/cpuapr2022.html
generic_textual HIGH https://www.oracle.com/security-alerts/cpuapr2022.html
cvssv3.1 8.2 https://www.oracle.com/security-alerts/cpujan2022.html
generic_textual HIGH https://www.oracle.com/security-alerts/cpujan2022.html
cvssv3.1 8.2 https://www.oracle.com/security-alerts/cpujul2022.html
generic_textual HIGH https://www.oracle.com/security-alerts/cpujul2022.html
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L Found at https://github.com/ckeditor/ckeditor4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L Found at https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-417
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L Found at https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7h26-63m7-qhf2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2021-41165
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L Found at https://www.drupal.org/sa-core-2021-011
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L Found at https://www.oracle.com/security-alerts/cpuapr2022.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L Found at https://www.oracle.com/security-alerts/cpujan2022.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L Found at https://www.oracle.com/security-alerts/cpujul2022.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.30478
EPSS Score 0.00117
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:49:04.882902+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/ckeditor4/CVE-2021-41165.yml 38.0.0