CVE-2024-29504: Summernote vulnerable to cross-site scripting
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.60565%
CWE
Published
4/11/2024
Updated
4/12/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
summernote | npm | <= 0.8.18 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from inadequate input sanitization when processing codeview content. The GitHub PR #3782 reveals that the core issue was in the dom_value function's lack of HTML entity escaping for &, <, and > characters. Additionally, the Codeview.toggle function's handling of raw HTML during mode switching (as demonstrated in the PoV with <script>alert(1)</script> payload) directly executes untrusted input. The patch attempts to address this by adding character escaping in dom_value, confirming these functions' roles in the vulnerability chain.