CVE-2025-3191: React Draft Wysiwyg Cross-Site Scripting (XSS) via the Embedded Button
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.04923%
CWE
Published
4/4/2025
Updated
4/4/2025
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| react-draft-wysiwyg | npm | <= 1.15.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability is triggered through the Embedded button functionality in the react-draft-wysiwyg Editor component. Based on the package's architecture and the PoC, the attack flow would involve: 1) handleEmbeddedLink processing the malicious input, 2) addEmbedded creating the iframe element, and 3) render displaying the content. These functions would appear in the call stack during exploitation. The confidence is high for handleEmbeddedLink as it's the primary input handler, and medium for the others as they're involved in the processing chain but might not directly contain the vulnerability.