Miggo Logo

CVE-2021-30109: Cross-site Scripting in Froala Editor

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.43495%
Published
10/6/2021
Updated
2/1/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
froala-editornpm<= 3.2.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

While exact function names aren't explicitly disclosed in available sources, the vulnerability manifests in hyperlink creation where base64 strings are processed. The core link handling functionality would logically contain the vulnerable code path that decodes and inserts untrusted input without adequate sanitization. Confidence is medium due to the specificity of the attack vector (hyperlink module + base64 processing) but lack of explicit code references.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ro*l* **itor *.*.* is *****t** *y *ross Sit* S*riptin* (XSS). Un**r **rt*in *on*itions, * **s*** *r**t** strin* l***s to p*rsist*nt *ross-sit* s*riptin* (XSS) vuln*r**ility wit*in t** *yp*rlink *r**tion mo*ul*.

Reasoning

W*il* *x**t *un*tion n*m*s *r*n't *xpli*itly *is*los** in *v*il**l* sour**s, t** vuln*r**ility m*ni**sts in *yp*rlink *r**tion w**r* **s*** strin*s *r* pro**ss**. T** *or* link **n*lin* *un*tion*lity woul* lo*i**lly *ont*in t** vuln*r**l* *o** p*t* t