NA

CVE-2021-26272

Published: 26/01/2021 Updated: 20/07/2021
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

It was possible to execute a ReDoS-type attack inside CKEditor 4 prior to 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin).

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ckeditor ckeditor

Vendor Advisories

Debian Bug report logs - #982587 ckeditor: CVE-2021-26271 CVE-2021-26272 Package: src:ckeditor; Maintainer for src:ckeditor is Debian Javascript Maintainers <pkg-javascript-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 12 Feb 2021 07:45:01 UTC Severity: important Tag ...
Muliple CKEditor vulnerablities affect IBM Control Center See vulnerability details for descriptions ...

Github Repositories

Welcome to ReDoSFuzz Pages You can use the editor on GitHub to maintain and preview the content for your website in Markdown files Whenever you commit to this repository, GitHub Pages will run Jekyll to rebuild the pages in your site, from the content in your Markdown files Markdown Left-aligned Center-aligned Right-aligned CVE-2021-26272 git status git status git di