First published: Fri Feb 18 2022(Updated: )
A Cross-site scripting attack was found in Prism. The command-line plugin did not properly escape its output. This issue leads to the input text being inserted into the Document Object Model (DOM) as HTML code, which can be exploited by an attacker.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/prismjs | <1.27.0 | 1.27.0 |
Prismjs Prism | >=1.14.0<1.27.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23647 is a Cross-site scripting (XSS) vulnerability found in the Prism syntax highlighting library's command-line plugin.
CVE-2022-23647 has a severity rating of high (CVSS score 6.1).
Versions of Prism's command-line plugin from 1.14.0 to 1.27.0 are affected.
An attacker can exploit CVE-2022-23647 by injecting malicious code or scripts into input fields that are not properly escaped in the command-line plugin, leading to cross-site scripting attacks.
To fix CVE-2022-23647, it is recommended to update to version 1.27.0 or later of Prism's command-line plugin.