Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2515 | Editor.js is a block-style editor with clean JSON output. Versions prior to 2.26.0 are vulnerable to Code Injection via pasted input. The processHTML method passes pasted input into wrapper’s innerHTML. This issue is patched in version 2.26.0. |
Github GHSA |
GHSA-6mvj-2569-3mcm | Editor.js vulnerable to Code Injection |
Thu, 17 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-17T18:14:12.107Z
Reserved: 2022-01-19T21:23:53.757Z
Link: CVE-2022-23474
Updated: 2024-08-03T03:43:46.063Z
Status : Modified
Published: 2022-12-15T19:15:16.613
Modified: 2024-11-21T06:48:38.147
Link: CVE-2022-23474
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA