{"containers":{"cna":{"affected":[{"product":"Jodit Editor","vendor":"xdan","versions":[{"lessThanOrEqual":"3.20.4","status":"affected","version":"3.20.4","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"Jodit Editor is a WYSIWYG editor written in pure TypeScript without the use of additional libraries. Jodit Editor is vulnerable to XSS attacks when pasting specially constructed input. This issue has not been fully patched. There are no known workarounds."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Cross-site Scripting (XSS)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-09-24T03:25:08.000Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"tags":["x_refsource_MISC"],"url":"https://securitylab.github.com/advisories/GHSL-2022-030_xdan_jodit/"}],"source":{"advisory":"GHSL-2022-030","discovery":"UNKNOWN"},"title":"Cross-Site Scripting (XSS) in Jodit Editor","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-23461","STATE":"PUBLIC","TITLE":"Cross-Site Scripting (XSS) in Jodit Editor"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Jodit Editor","version":{"version_data":[{"version_affected":"<=","version_name":"3.20.4","version_value":"3.20.4"}]}}]},"vendor_name":"xdan"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Jodit Editor is a WYSIWYG editor written in pure TypeScript without the use of additional libraries. Jodit Editor is vulnerable to XSS attacks when pasting specially constructed input. This issue has not been fully patched. There are no known workarounds."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-site Scripting (XSS)"}]}]},"references":{"reference_data":[{"name":"https://securitylab.github.com/advisories/GHSL-2022-030_xdan_jodit/","refsource":"MISC","url":"https://securitylab.github.com/advisories/GHSL-2022-030_xdan_jodit/"}]},"source":{"advisory":"GHSL-2022-030","discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T03:43:46.107Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://securitylab.github.com/advisories/GHSL-2022-030_xdan_jodit/"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-22T15:44:05.648336Z","id":"CVE-2022-23461","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-22T17:20:52.980Z"}}]},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2022-23461","datePublished":"2022-09-24T03:05:08.000Z","dateReserved":"2022-01-19T00:00:00.000Z","dateUpdated":"2025-04-22T17:20:52.980Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}