Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1682 | @udecode/plate-link is the link handler for the udecode/plate rich-text editor plugin system for Slate & React. Affected versions of the link plugin and link UI component do not sanitize URLs to prevent use of the `javascript:` scheme. As a result, links with JavaScript URLs can be inserted into the Plate editor through various means, including opening or pasting malicious content. `@udecode/plate-link` 20.0.0 resolves this issue by introducing an `allowedSchemes` option to the link plugin, defaulting to `['http', 'https', 'mailto', 'tel']`. URLs using a scheme that isn't in this list will not be rendered to the DOM. Users are advised to upgrade. Users unable to upgrade are advised to override the `LinkElement` and `PlateFloatingLink` components with implementations that explicitly check the URL scheme before rendering any anchor elements. |
Github GHSA |
GHSA-4882-hxpr-hrvm | @udecode/plate-link does not sanitize URLs to prevent use of the `javascript:` scheme |
Mon, 06 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-01-06T18:13:51.501Z
Reserved: 2023-05-31T13:51:51.173Z
Link: CVE-2023-34245
Updated: 2024-08-02T16:01:54.346Z
Status : Modified
Published: 2023-06-09T18:15:09.813
Modified: 2024-11-21T08:06:51.123
Link: CVE-2023-34245
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA