Skip to content

XSS vulnerability in TextHTML plugin #2405

@eoniboogie

Description

@eoniboogie

Description:
A cross-site scripting (XSS) vulnerability was identified in the /pagepreview page.
User input is not properly sanitized before being reflected in the HTTP response.

Impact:
An attacker could craft a malicious URL that executes arbitrary JavaScript in the victim’s browser.

Recommendation:
Implement proper input validation and output encoding on both frontend and backend.

Note:
Detailed reproduction steps and screenshots have been shared with the maintainer privately.

You can reproduce the vulnerability by following the steps below.

  1. Access to /?pagePreview=1 and select TextHTML plugin.
Image
  1. From the hamburger menu select edit button.
Image
  1. Insert payload and submit.
Image
  1. Refresh the page and check the script is triggered.
Image

Metadata

Metadata

Labels

bugSomething isn't working

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions