CVE-2021-30109
Cross Site Scripting (XSS) vulnerability in froala-editor (npm)
What is CVE-2021-30109 About?
Froala Editor 3.2.6 is vulnerable to persistent Cross Site Scripting (XSS). This allows attackers to inject malicious scripts into the application via a specially crafted base64 string within the hyperlink creation module. Successful exploitation can lead to client-side code execution and is moderately easy to achieve.
Affected Software
Technical Details
The vulnerability in Froala Editor 3.2.6 is a persistent Cross Site Scripting (XSS) flaw. It manifests specifically within the hyperlink creation module. An attacker can craft a malicious base64-encoded string that, when processed by the editor and subsequently rendered, executes arbitrary client-side script. This occurs because the editor fails to properly sanitize or encode user-supplied input, particularly within the context of URL attributes or content that can contain base64-encoded data. When the crafted string is saved and later loaded by another user, the embedded script is executed in their browser, leading to an XSS payload being delivered.
What is the Impact of CVE-2021-30109?
Successful exploitation may allow attackers to execute arbitrary client-side script, leading to session hijacking, website defacement, sensitive data theft, or redirection to malicious sites.
What is the Exploitability of CVE-2021-30109?
Exploitation of this XSS vulnerability is of moderate complexity, as it requires an attacker to understand how to craft a base64-encoded string that the Froala Editor will interpret as malicious script within the hyperlink creation module. Authentication is required to access the editor and its hyperlink creation functionality. No elevated privileges beyond a regular user with content editing capabilities are typically necessary. This is a remote vulnerability, where an attacker injects the payload into content that is then stored and served to other users. The key condition is that the editor must process and render the crafted base64 string without proper sanitization. The existence of a proof-of-concept increases the likelihood of practical exploitation.
What are the Known Public Exploits?
| PoC Author | Link | Commentary |
|---|---|---|
| Hackdwerg | Link | Froala Persistent XSS |
What are the Available Fixes for CVE-2021-30109?
Available Upgrade Options
- No fixes available
Struggling with dependency upgrades?
See how Resolved Security's drop-in replacements make it simple.
Book a demoAdditional Resources
- https://github.com/Hackdwerg/CVE-2021-30109/blob/main/README.md
- https://github.com/Hackdwerg/CVE-2021-30109/blob/main/README.md
- http://froala.com
- https://osv.dev/vulnerability/GHSA-cq6w-w5rj-p9x8
- https://github.com/froala/wysiwyg-editor-release
- https://nvd.nist.gov/vuln/detail/CVE-2021-30109
- http://froala.com
What are Similar Vulnerabilities to CVE-2021-30109?
Similar Vulnerabilities: CVE-2019-15074 , CVE-2020-7798 , CVE-2021-23343 , CVE-2022-24707 , CVE-2023-28821
