Home

Description

Versions of the package @tiptap/extension-link before 2.10.4 are vulnerable to Cross-site Scripting (XSS) due to unsanitized user input allowed in setting or toggling links. An attacker can execute arbitrary JavaScript code in the context of the application by injecting a javascript: URL payload into these attributes, which is then triggered either by user interaction.

PUBLISHED Reserved 2025-12-08 | Published 2025-12-09 | Updated 2025-12-09 | Assigner snyk




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N/E:P
MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P

Problem types

Cross-site Scripting (XSS)

Credits

Thai Do Nhat

References

gist.github.com/th4s1s/3d1b6cd3e7257b14947242f712ec6e1f exploit

security.snyk.io/vuln/SNYK-JS-TIPTAPEXTENSIONLINK-14222197

gist.github.com/th4s1s/3d1b6cd3e7257b14947242f712ec6e1f

github.com/...ommit/1c2fefe3d61ab1c8fbaa6d6b597251e1b6d9aaed

github.com/ueberdosis/tiptap/releases/tag/v2.10.4

cve.org (CVE-2025-14284)

nvd.nist.gov (CVE-2025-14284)

Download JSON