Description
It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin).
Remediation
References
https://ckeditor.com/blog/CKEditor-4.16-with-improved-image-pasting-High-Contrast-support-and-a-new-color-API/#security-comes-first
https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-416
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
Related Vulnerabilities
CVE-2022-36884 Vulnerability in maven package org.jenkins-ci.plugins:git
CVE-2022-36914 Vulnerability in maven package org.jenkins-ci.plugins:files-found-trigger
CVE-2011-5062 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2013-1966 Vulnerability in maven package org.apache.struts.xwork:xwork-core