@ckeditor/ckeditor5-markdown-gfm@10.0.0 vulnerabilities

GitHub Flavored Markdown data processor for CKEditor 5.

Direct Vulnerabilities

Known vulnerabilities in the @ckeditor/ckeditor5-markdown-gfm package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-site Scripting (XSS)

@ckeditor/ckeditor5-markdown-gfm is a GitHub Flavored Markdown data processor for CKEditor 5.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Exploiting this vulnerability is possible by destroying the editor and then initializing the editor on an element and using an element other than <textarea> as a base.

Note: In case of ckeditor5-html-support and ckeditor5-html-embed it is required to use a configuration that allows unsafe markup inside the editor.

How to fix Cross-site Scripting (XSS)?

Upgrade @ckeditor/ckeditor5-markdown-gfm to version 35.0.1 or higher.

<35.0.1
  • M
Regular Expression Denial of Service (ReDoS)

@ckeditor/ckeditor5-markdown-gfm is a GitHub Flavored Markdown data processor for CKEditor 5.

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). It allows to abuse particular regular expressions, which could cause a significant performance drop resulting in a browser tab freeze.

How to fix Regular Expression Denial of Service (ReDoS)?

Upgrade @ckeditor/ckeditor5-markdown-gfm to version 27.0.0 or higher.

<27.0.0
  • H
Regular Expression Denial of Service (ReDoS)

@ckeditor/ckeditor5-markdown-gfm is a GitHub Flavored Markdown data processor for CKEditor 5.

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via automatic link recognition.

How to fix Regular Expression Denial of Service (ReDoS)?

Upgrade @ckeditor/ckeditor5-markdown-gfm to version 25.0.0 or higher.

<25.0.0