Miggo Logo

CVE-2022-23461: Jodit Editor vulnerable to Cross-site Scripting

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.70638%
Published
9/25/2022
Updated
1/28/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
joditnpm<= 3.24.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests during HTML paste operations where specially crafted content bypasses sanitization. The PoC demonstrates that Microsoft Word-generated meta tags and <img> onerror handlers are not properly neutralized. This indicates two key points of failure: 1) The paste handling module's HTML processing logic (Paste.prototype.processHTML) that accepts untrusted input, and 2) The core sanitization function (sanitizeHTML) responsible for filtering dangerous elements. Both are explicitly referenced in security advisories as locations where custom sanitization was implemented but found insufficient. The maintainer's acknowledgment of incomplete patching further supports this assessment.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Jo*it **itor is * WYSIWY* **itor writt*n in pur* Typ*S*ript wit*out t** us* o* ***ition*l li*r*ri*s. Jo*it **itor is vuln*r**l* to XSS *tt**ks w**n p*stin* sp**i*lly *onstru*t** input. T*is issu* **s not ***n *ully p*t****. T**r* *r* no known work*ro

Reasoning

T** vuln*r**ility m*ni**sts *urin* *TML p*st* op*r*tions w**r* sp**i*lly *r**t** *ont*nt *yp*ss*s s*nitiz*tion. T** Po* **monstr*t*s t**t Mi*roso*t Wor*-**n*r*t** m*t* t**s *n* <im*> on*rror **n*l*rs *r* not prop*rly n*utr*liz**. T*is in*i**t*s two k