Description
Prism is vulnerable to Cross-Site Scripting. The easing preview of the Previewers plugin has an XSS vulnerability that allows attackers to execute arbitrary code in Safari and Internet Explorer. This impacts all Safari and Internet Explorer users of Prism >=v1.1.0 that use the _Previewers_ plugin (>=v1.10.0) or the _Previewer: Easing_ plugin (v1.1.0 to v1.9.0). This problem is fixed in version 1.21.0. To workaround the issue without upgrading, disable the easing preview on all impacted code blocks. You need Prism v1.10.0 or newer to apply this workaround.
Remediation
References
https://github.com/PrismJS/prism/pull/2506/commits/7bd7de05edf71112a3a77f87901a2409c9c5c20c
https://github.com/PrismJS/prism/security/advisories/GHSA-wvhm-4hhf-97x9
https://prismjs.com/plugins/previewers/#disabling-a-previewer
Related Vulnerabilities
CVE-2023-32688 Vulnerability in npm package @parse/push-adapter
CVE-2022-24697 Vulnerability in maven package org.apache.kylin:kylin-core-common
CVE-2020-36649 Vulnerability in maven package org.webjars.bower:papaparse
CVE-2021-41165 Vulnerability in npm package ckeditor4
CVE-2022-3952 Vulnerability in maven package com.manydesigns:portofino-microservice-launcher