Description
A vulnerability in the HTML editor of Slab Quill 4.8.0 allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted onloadstart attribute of an IMG element) in a text field. Note: Researchers have claimed that this issue is not within the product itself, but is intended behavior in a web browser
Remediation
References
https://burninatorsec.blogspot.com/2021/04/cve-2021-3163-xss-slab-quill-js.html
https://github.com/quilljs/quill/issues/3273
https://github.com/quilljs/quill/issues/3364
https://quilljs.com
Related Vulnerabilities
CVE-2023-46122 Vulnerability in maven package org.scala-sbt:io_2.13
CVE-2021-25329 Vulnerability in maven package org.apache.tomcat:tomcat-catalina
CVE-2023-5245 Vulnerability in maven package ml.combust.bundle:bundle-ml_2.12
CVE-2022-0235 Vulnerability in npm package node-fetch
CVE-2022-24613 Vulnerability in maven package com.drewnoakes:metadata-extractor