{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-23474","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","requesterUserId":"c184a3d9-dc98-4c48-a45b-d2d88cf0ac74","dateReserved":"2022-01-19T21:23:53.757Z","datePublished":"2022-12-15T02:08:07.054Z","dateUpdated":"2025-04-17T18:14:12.107Z"},"containers":{"cna":{"title":"editor.js contains Code Injection","problemTypes":[{"descriptions":[{"cweId":"CWE-94","lang":"en","description":"CWE-94: Improper Control of Generation of Code ('Code Injection')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","version":"3.1"}}],"references":[{"name":"https://securitylab.github.com/advisories/GHSL-2022-028_codex-team_editor_js/","tags":["x_refsource_CONFIRM"],"url":"https://securitylab.github.com/advisories/GHSL-2022-028_codex-team_editor_js/"},{"name":"https://github.com/codex-team/editor.js/pull/2100","tags":["x_refsource_MISC"],"url":"https://github.com/codex-team/editor.js/pull/2100"}],"affected":[{"vendor":"codex-team","product":"editor.js","versions":[{"version":"2.26.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2022-12-15T02:08:07.054Z"},"descriptions":[{"lang":"en","value":"Editor.js is a block-style editor with clean JSON output. Versions prior to 2.26.0 are vulnerable to Code Injection via pasted input. The processHTML method passes pasted input into wrapper’s innerHTML. This issue is patched in version 2.26.0."}],"source":{"advisory":"GHSA-6mvj-2569-3mcm","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T03:43:46.063Z"},"title":"CVE Program Container","references":[{"name":"https://securitylab.github.com/advisories/GHSL-2022-028_codex-team_editor_js/","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://securitylab.github.com/advisories/GHSL-2022-028_codex-team_editor_js/"},{"name":"https://github.com/codex-team/editor.js/pull/2100","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/codex-team/editor.js/pull/2100"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-17T18:13:06.745963Z","id":"CVE-2022-23474","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-17T18:14:12.107Z"}}]}}