Unknown
CVE-2024-40631
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Plate media is an open source, rich-text editor for React. Editors that use MediaEmbedElement
and pass custom urlParsers
to the useMediaState
hook may be vulnerable to XSS if a custom parser allows javascript:
, data:
or vbscript:
URLs to be embedded. Editors that do not use urlParsers
and consume the url
property directly may also be vulnerable if the URL is not sanitised. The default parsers parseTwitterUrl
and parseVideoUrl
are not affected. @udecode/plate-media
36.0.10 resolves this issue by only allowing HTTP and HTTPS URLs during parsing. This affects only the embed
property returned from useMediaState
. In addition, the url
property returned from useMediaState
has been renamed to unsafeUrl
to indicate that it has not been sanitised. The url
property on element
is also unsafe, but has not been renamed. If you’re using either of these properties directly, you will still need to validate the URL yourself. Users are advised to upgrade. Users unable to upgrade should ensure that any custom urlParsers
do not allow javascript:
, data:
or vbscript:
URLs to be returned in the url
property of their return values. If url
is consumed directly, validate the URL protocol before passing it to the iframe
element.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: