Versions of the package @tiptap/extension-link before 2.10.4 are vulnerable to Cross-site Scripting (XSS) due to unsanitized user input allowed in setting or toggling links. An attacker can execute arbitrary JavaScript code in the context of the application by injecting a javascript: URL payload into these attributes, which is then triggered either by user interaction.
Metrics
Affected Vendors & Products
References
History
Tue, 09 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Dec 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tiptap
Tiptap tiptap |
|
| Vendors & Products |
Tiptap
Tiptap tiptap |
Tue, 09 Dec 2025 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Versions of the package @tiptap/extension-link before 2.10.4 are vulnerable to Cross-site Scripting (XSS) due to unsanitized user input allowed in setting or toggling links. An attacker can execute arbitrary JavaScript code in the context of the application by injecting a javascript: URL payload into these attributes, which is then triggered either by user interaction. | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: snyk
Published: 2025-12-09T05:00:03.409Z
Updated: 2025-12-09T14:59:53.928Z
Reserved: 2025-12-08T18:35:25.788Z
Link: CVE-2025-14284
Updated: 2025-12-09T14:59:39.376Z
Status : Awaiting Analysis
Published: 2025-12-09T16:17:37.657
Modified: 2025-12-09T18:37:13.640
Link: CVE-2025-14284
No data.