Skip to content

XSS vulnerability in TextHTML plugin #2405

@eoniboogie

Description

@eoniboogie

Description:
A cross-site scripting (XSS) vulnerability was identified in the /pagepreview page.
User input is not properly sanitized before being reflected in the HTTP response.

Impact:
An attacker could craft a malicious URL that executes arbitrary JavaScript in the victim’s browser.

Recommendation:
Implement proper input validation and output encoding on both frontend and backend.

Note:
Detailed reproduction steps and screenshots have been shared with the maintainer privately.

You can reproduce the vulnerability by following the steps below.

  1. Access to /?pagePreview=1 and select TextHTML plugin.
Image
  1. From the hamburger menu select edit button.
Image
  1. Insert payload and submit.
Image
  1. Refresh the page and check the script is triggered.
Image

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions