Description
@joeattardi/emoji-button is a Vanilla JavaScript emoji picker component. In affected versions there are two vectors for XSS attacks: a URL for a custom emoji, and an i18n string. In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious code.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2506 | @joeattardi/emoji-button is a Vanilla JavaScript emoji picker component. In affected versions there are two vectors for XSS attacks: a URL for a custom emoji, and an i18n string. In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious code. |
Github GHSA |
GHSA-f34m-x9pj-62vq | Cross-Site Scripting Vulnerability in @joeattardi/emoji-button |
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-04T04:03:08.932Z
Reserved: 2021-11-16T00:00:00.000Z
Link: CVE-2021-43785
No data.
Status : Modified
Published: 2021-11-26T19:15:08.077
Modified: 2024-11-21T06:29:47.030
Link: CVE-2021-43785
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA