First published: Thu Nov 07 2024(Updated: )
Inconsistent <plaintext> tag parsing allows for XSS in Froala WYSIWYG editor 4.3.0 and earlier.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Froala WYSIWYG Editor | <4.3.0 | |
composer/froala/wysiwyg-editor | <=4.3.0 | |
npm/froala-editor | <=4.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51434 has been rated as critical due to its potential for XSS attacks in affected software.
To mitigate CVE-2024-51434, upgrade the Froala WYSIWYG editor to version 4.3.1 or later.
The vulnerability CVE-2024-51434 affects Froala WYSIWYG Editor up to version 4.3.0, including versions available via npm and composer.
CVE-2024-51434 allows for Cross-Site Scripting (XSS) attacks due to inconsistent parsing of the <plaintext> tag.
Yes, CVE-2024-51434 is actively being exploited in the wild, increasing the urgency for updates.