CVE-2025-14284: Cross-site Scripting (XSS) in @tiptap/extension-link
Versions of the package @tiptap/extension-link before 2.10.4 are vulnerable to Cross-site Scripting (XSS) due to unsanitized user input allowed in setting or toggling links. An attacker can execute arbitrary JavaScript code in the context of the application by injecting a javascript: URL payload into these attributes, which is then triggered either by user interaction.
AI Analysis
Technical Summary
CVE-2025-14284 identifies a Cross-site Scripting (XSS) vulnerability in the @tiptap/extension-link package, a widely used extension for the Tiptap rich-text editor framework. Versions prior to 2.10.4 fail to sanitize user input when setting or toggling hyperlink elements, specifically allowing injection of javascript: URL schemes. This unsanitized input can be crafted by an attacker to embed arbitrary JavaScript code within link attributes. When a user interacts with such a malicious link, the embedded script executes within the application's security context, potentially compromising user data or session integrity. The vulnerability is exploitable remotely over the network without requiring authentication, but it does require user interaction to trigger the payload. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:A/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N/E:P) indicates low attack complexity and no privileges needed, but user interaction is mandatory. Although no active exploitation has been reported, the vulnerability poses a risk to any web application embedding this package, especially those allowing users to input or modify link content. The vulnerability was published on December 9, 2025, and the fix is available in version 2.10.4 and later. The lack of known exploits suggests a window for proactive remediation. This vulnerability highlights the importance of rigorous input validation and output encoding in web components handling user-generated content.
Potential Impact
For European organizations, this vulnerability can lead to significant security risks including theft of authentication tokens, session hijacking, defacement, or redirection to malicious sites. Organizations using @tiptap/extension-link in customer-facing or internal collaborative applications may inadvertently expose users to malicious scripts. The impact on confidentiality and integrity is moderate, as attackers can execute arbitrary scripts but only after user interaction. Availability impact is low. The vulnerability could be leveraged in targeted phishing or social engineering campaigns to compromise user accounts or inject malware. Sectors such as finance, healthcare, and government, which rely heavily on secure web applications, could face reputational damage and regulatory consequences if exploited. The medium CVSS score reflects these moderate but non-trivial risks. Since the vulnerability is in a frontend component, the attack surface is broad but requires user engagement, somewhat limiting mass exploitation. However, given the widespread use of Tiptap in modern web apps, the potential scope is considerable.
Mitigation Recommendations
The primary mitigation is to upgrade the @tiptap/extension-link package to version 2.10.4 or later, where the vulnerability is patched. Organizations should audit their codebases and dependencies to identify affected versions. Additionally, implement strict input validation to reject or sanitize any user-supplied URLs, especially those containing javascript: schemes or other executable content. Employ robust output encoding on all link attributes to prevent script execution. Use Content Security Policy (CSP) headers to restrict the execution of inline scripts and untrusted sources. Educate developers on secure coding practices related to user input handling in rich-text editors. Conduct thorough security testing of web applications incorporating this package, including penetration testing focused on XSS vectors. Monitor for suspicious user activity that could indicate exploitation attempts. Finally, maintain an up-to-date inventory of frontend dependencies to rapidly respond to newly disclosed vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-14284: Cross-site Scripting (XSS) in @tiptap/extension-link
Description
Versions of the package @tiptap/extension-link before 2.10.4 are vulnerable to Cross-site Scripting (XSS) due to unsanitized user input allowed in setting or toggling links. An attacker can execute arbitrary JavaScript code in the context of the application by injecting a javascript: URL payload into these attributes, which is then triggered either by user interaction.
AI-Powered Analysis
Technical Analysis
CVE-2025-14284 identifies a Cross-site Scripting (XSS) vulnerability in the @tiptap/extension-link package, a widely used extension for the Tiptap rich-text editor framework. Versions prior to 2.10.4 fail to sanitize user input when setting or toggling hyperlink elements, specifically allowing injection of javascript: URL schemes. This unsanitized input can be crafted by an attacker to embed arbitrary JavaScript code within link attributes. When a user interacts with such a malicious link, the embedded script executes within the application's security context, potentially compromising user data or session integrity. The vulnerability is exploitable remotely over the network without requiring authentication, but it does require user interaction to trigger the payload. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:A/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N/E:P) indicates low attack complexity and no privileges needed, but user interaction is mandatory. Although no active exploitation has been reported, the vulnerability poses a risk to any web application embedding this package, especially those allowing users to input or modify link content. The vulnerability was published on December 9, 2025, and the fix is available in version 2.10.4 and later. The lack of known exploits suggests a window for proactive remediation. This vulnerability highlights the importance of rigorous input validation and output encoding in web components handling user-generated content.
Potential Impact
For European organizations, this vulnerability can lead to significant security risks including theft of authentication tokens, session hijacking, defacement, or redirection to malicious sites. Organizations using @tiptap/extension-link in customer-facing or internal collaborative applications may inadvertently expose users to malicious scripts. The impact on confidentiality and integrity is moderate, as attackers can execute arbitrary scripts but only after user interaction. Availability impact is low. The vulnerability could be leveraged in targeted phishing or social engineering campaigns to compromise user accounts or inject malware. Sectors such as finance, healthcare, and government, which rely heavily on secure web applications, could face reputational damage and regulatory consequences if exploited. The medium CVSS score reflects these moderate but non-trivial risks. Since the vulnerability is in a frontend component, the attack surface is broad but requires user engagement, somewhat limiting mass exploitation. However, given the widespread use of Tiptap in modern web apps, the potential scope is considerable.
Mitigation Recommendations
The primary mitigation is to upgrade the @tiptap/extension-link package to version 2.10.4 or later, where the vulnerability is patched. Organizations should audit their codebases and dependencies to identify affected versions. Additionally, implement strict input validation to reject or sanitize any user-supplied URLs, especially those containing javascript: schemes or other executable content. Employ robust output encoding on all link attributes to prevent script execution. Use Content Security Policy (CSP) headers to restrict the execution of inline scripts and untrusted sources. Educate developers on secure coding practices related to user input handling in rich-text editors. Conduct thorough security testing of web applications incorporating this package, including penetration testing focused on XSS vectors. Monitor for suspicious user activity that could indicate exploitation attempts. Finally, maintain an up-to-date inventory of frontend dependencies to rapidly respond to newly disclosed vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- snyk
- Date Reserved
- 2025-12-08T18:35:25.788Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6937aed7c0f7ae2eacecdbcf
Added to database: 12/9/2025, 5:08:39 AM
Last enriched: 12/16/2025, 6:08:48 AM
Last updated: 2/7/2026, 3:01:33 AM
Views: 192
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.