Search for vulnerabilities
| Vulnerability ID | VCID-n25m-r6y8-mkey |
| Aliases |
GHSA-vfgc-c76h-mwh4
|
| Summary | Drupal core Cross-Site Scripting (XSS) vulnerabilities The Drupal project uses the CKEditor, library for WYSIWYG editing. CKEditor has released a security update that impacts Drupal. Vulnerabilities are possible if Drupal is configured to allow use of the CKEditor library for WYSIWYG editing. An attacker that can create or edit content (even without access to CKEditor themselves) may be able to exploit one or more Cross-Site Scripting (XSS) vulnerabilities to target users with access to the WYSIWYG CKEditor, including site admins with privileged access. |
| Status | Published |
| Exploitability | 0.5 |
| Weighted Severity | 6.2 |
| Risk | 3.1 |
| Affected and Fixed Packages | Package Details |
| System | Score | Found at |
|---|---|---|
| cvssv3.1_qr | MODERATE | https://github.com/advisories/GHSA-vfgc-c76h-mwh4 |
| cvssv3.1 | 5.3 | https://github.com/drupal/core |
| generic_textual | MODERATE | https://github.com/drupal/core |
| cvssv3.1 | 5.3 | https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/2021-05-26.yaml |
| generic_textual | MODERATE | https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/2021-05-26.yaml |
| cvssv3.1 | 5.3 | https://www.drupal.org/sa-core-2021-005 |
| generic_textual | MODERATE | https://www.drupal.org/sa-core-2021-005 |
| Reference id | Reference type | URL |
|---|---|---|
| https://github.com/drupal/core | ||
| https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/2021-05-26.yaml | ||
| https://www.drupal.org/sa-core-2021-005 | ||
| GHSA-vfgc-c76h-mwh4 | https://github.com/advisories/GHSA-vfgc-c76h-mwh4 |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
No EPSS data available for this vulnerability.
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2025-07-31T08:35:59.085319+00:00 | GithubOSV Importer | Import | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-vfgc-c76h-mwh4/GHSA-vfgc-c76h-mwh4.json | 37.0.0 |