CVE-2025-58064

Sept. 4, 2025, 3:35 p.m.

2.3
Low

Description

CKEditor 5 is a modern JavaScript rich-text editor with an MVC architecture. ckeditor5 and ckeditor5-clipboard versions 46.0.0 through 46.0.2 and 44.2.0 through 45.2.1 contain a Cross-Site Scripting (XSS) vulnerability. Ability to exploit could be triggered by a specific user action (leading to unauthorized JavaScript code execution) if the attacker managed to insert a malicious content into the editor, which might happen with a very specific editor configuration. This vulnerability affects installations where the editor configuration meets one of the following criteria: the HTML embed plugin is enabled, or there is a custom plugin introducing an editable element where view RawElement is enabled. This issue is fixed in versions 45.2.2 and 46.0.3 of both ckeditor5 and ckeditor5-clipboard.

Product(s) Impacted

Vendor Product Versions
Ckeditor
  • Ckeditor5
  • Ckeditor5-clipboard
  • 46.0.0-46.0.2, 44.2.0-45.2.1, 45.2.2, 46.0.3
  • 46.0.0-46.0.2, 44.2.0-45.2.1, 45.2.2, 46.0.3

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a ckeditor ckeditor5 46.0.0-46.0.2 / / / / / / /
a ckeditor ckeditor5 44.2.0-45.2.1 / / / / / / /
a ckeditor ckeditor5 45.2.2 / / / / / / /
a ckeditor ckeditor5 46.0.3 / / / / / / /
a ckeditor ckeditor5-clipboard 46.0.0-46.0.2 / / / / / / /
a ckeditor ckeditor5-clipboard 44.2.0-45.2.1 / / / / / / /
a ckeditor ckeditor5-clipboard 45.2.2 / / / / / / /
a ckeditor ckeditor5-clipboard 46.0.3 / / / / / / /

CVSS Score

2.3 / 10

CVSS Data - 4.0

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Attack Requirements: PRESENT
  • Privileges Required: NONE
  • User Interaction: PASSIVE
  • Scope:
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: NONE
  • Exploit Maturity: NOT_DEFINED
  • CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    View Vector String

Timeline

Published: Sept. 4, 2025, 10:42 a.m.
Last Modified: Sept. 4, 2025, 3:35 p.m.

Status : Awaiting Analysis

CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.

More info

Source

security-advisories@github.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.