Versions of the package quill-mention before 4.0.0 are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization, via the renderList function.
**Note:**
If the mentions list is sourced from unsafe (user-sourced) data, this might allow an injection attack when a Quill user hits @.
References
Configurations
History
21 Nov 2024, 07:50
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-28 05:15
Updated : 2024-11-21 07:50
NVD link : CVE-2023-26149
Mitre link : CVE-2023-26149
CVE.ORG link : CVE-2023-26149
JSON object : View
Products Affected
quill-mention
- quill_mention
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')