Description
Versions of the package @tiptap/extension-link before 2.10.4 are vulnerable to Cross-site Scripting (XSS) due to unsanitized user input allowed in setting or toggling links. An attacker can execute arbitrary JavaScript code in the context of the application by injecting a javascript: URL payload into these attributes, which is then triggered either by user interaction.
Problem types
Credits
Thai Do Nhat
References
gist.github.com/th4s1s/3d1b6cd3e7257b14947242f712ec6e1f
security.snyk.io/vuln/SNYK-JS-TIPTAPEXTENSIONLINK-14222197
gist.github.com/th4s1s/3d1b6cd3e7257b14947242f712ec6e1f
github.com/...ommit/1c2fefe3d61ab1c8fbaa6d6b597251e1b6d9aaed
github.com/ueberdosis/tiptap/releases/tag/v2.10.4