Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28343: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ckeditor ckeditor5

0
Medium
VulnerabilityCVE-2026-28343cvecve-2026-28343cwe-79
Published: Thu Mar 05 2026 (03/05/2026, 19:42:58 UTC)
Source: CVE Database V5
Vendor/Project: ckeditor
Product: ckeditor5

Description

CKEditor 5 is a modern JavaScript rich-text editor with an MVC architecture. Prior to version 47.6.0, a cross-site scripting (XSS) vulnerability has been discovered in the General HTML Support feature. This vulnerability could be triggered by inserting specially crafted markup, leading to unauthorized JavaScript code execution, if the editor instance used an unsafe General HTML Support configuration. This issue has been patched in version 47.6.0.

AI-Powered Analysis

AILast updated: 03/05/2026, 20:08:40 UTC

Technical Analysis

CVE-2026-28343 is a cross-site scripting (XSS) vulnerability identified in CKEditor 5, a widely used modern JavaScript rich-text editor with an MVC architecture. The vulnerability resides in the General HTML Support feature, which allows users to insert arbitrary HTML markup. Prior to version 47.6.0, if the editor instance was configured with an unsafe General HTML Support setup, specially crafted markup could be injected that bypasses input neutralization controls. This leads to unauthorized execution of JavaScript code within the context of the affected web application. The vulnerability requires the attacker to have low privileges (PR:L) but does not require user interaction (UI:N), and it can be exploited remotely over the network (AV:N). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The CVSS v3.1 base score is 6.4, reflecting medium severity, with impacts on confidentiality and integrity but not availability. The issue has been patched in CKEditor 5 version 47.6.0. No known exploits have been reported in the wild, but the vulnerability poses a significant risk if the unsafe configuration is present in production environments. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation.

Potential Impact

The primary impact of this vulnerability is unauthorized execution of JavaScript code in the context of affected web applications, which can lead to data theft, session hijacking, or manipulation of web content. This compromises the confidentiality and integrity of user data and application state. Since CKEditor 5 is embedded in many web platforms globally, vulnerable instances could be targeted to perform phishing, defacement, or further attacks on users. The vulnerability does not affect availability directly but can undermine user trust and lead to reputational damage. Organizations relying on CKEditor 5 with unsafe General HTML Support configurations are at risk, especially those handling sensitive user data or operating in regulated industries. The ease of exploitation is moderate due to the low privilege requirement but no user interaction needed, increasing the likelihood of automated or targeted attacks if the vulnerability is discovered and weaponized.

Mitigation Recommendations

Organizations should immediately upgrade CKEditor 5 to version 47.6.0 or later, where the vulnerability is patched. Review and harden the General HTML Support configuration to restrict allowed HTML elements and attributes, minimizing the attack surface. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Conduct thorough input validation and output encoding on all user-supplied content, even when using rich-text editors. Regularly audit third-party components like CKEditor for updates and vulnerabilities. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with rules tuned to detect and block XSS payloads targeting CKEditor instances. Educate developers and administrators about secure configuration practices for rich-text editors to prevent unsafe setups.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-26T18:38:13.889Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a9df7061e8e69ef5e51b1f

Added to database: 3/5/2026, 7:54:24 PM

Last enriched: 3/5/2026, 8:08:40 PM

Last updated: 3/5/2026, 9:57:59 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses