We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
XSS vulnerability
V4.7.11
yes
1.Use the following code to build the environment or on the official demo website(https://codepen.io/xiaokyo-the-bold/pen/ZEpWByR)
<script type="text/javascript" src="https://unpkg.com/wangeditor/dist/wangEditor.min.js"></script> <span class="col-lg-8" id="editor"></span> <script type="text/javascript"> const E = window.wangEditor const editor = new E('#editor') editor.create() </script>
2.Visit this HTML page and do the following poyload: "><img src=1 onerror=alert(/xss/)>
"><img src=1 onerror=alert(/xss/)>
The text was updated successfully, but these errors were encountered:
link xss已经修复发版,可以试试新版本。
Sorry, something went wrong.
V5 已正式发布,v4 的 issue 将暂停处理。 该项目也是业余维护的,精力不够,还请体谅~
推荐尽快升级到 V5 版本。
Gavin-yh
Successfully merging a pull request may close this issue.
bug
XSS vulnerability
wangEditor version
V4.7.11
Can the official website reproduce the loopholes ?
yes
Reproduction steps
1.Use the following code to build the environment or on the official demo website(https://codepen.io/xiaokyo-the-bold/pen/ZEpWByR)
2.Visit this HTML page and do the following
poyload:
"><img src=1 onerror=alert(/xss/)>
The text was updated successfully, but these errors were encountered: