Description
It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin).
Remediation
References
https://ckeditor.com/blog/CKEditor-4.16-with-improved-image-pasting-High-Contrast-support-and-a-new-color-API/#security-comes-first
https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-416
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
Related Vulnerabilities
CVE-2023-33941 Vulnerability in maven package com.liferay:com.liferay.oauth2.provider.rest
CVE-2018-1000143 Vulnerability in maven package org.jenkins-ci.plugins:ghprb
CVE-2021-21175 Vulnerability in maven package org.webjars.npm:electron
CVE-2019-10403 Vulnerability in maven package org.jenkins-ci.main:jenkins-core