CVE-2021-28114
PHP vulnerability analysis and mitigation

Overview

Froala WYSIWYG Editor version 3.2.6-1 and earlier versions were affected by a cross-site scripting (XSS) vulnerability due to a namespace confusion during HTML parsing. The vulnerability was discovered on February 26, 2021, and was assigned CVE-2021-28114. This security flaw affected approximately 30,000 websites that utilized the Froala editor, a lightweight What-You-See-Is-What-You-Get HTML rich text editor for developers and content creators (Bishop Fox, ZDNET).

Technical details

The vulnerability stems from a confusion during the HTML parsing sequence. The tag causes the parser to switch its namespace context from HTML to MathML, which processes differently than HTML. The tag and embedded HTML comment causes the parser to switch context during the tokenization phase of HTML parsing and read the strings that follow as user data (RCDATA) rather than computer instructions. This parsing confusion allows attackers to bypass existing XSS protections by inserting JavaScript payloads in HTML event handlers within specific HTML and MathML tags (ZDNET, Bishop Fox).

Impact

The vulnerability's impact varies depending on the implementation context. It could manifest as either stored or reflected XSS, potentially allowing attackers to control affected sites' user experience, force unauthorized actions on behalf of users (such as bank transfers in worst-case scenarios), escalate privileges, or exfiltrate sensitive data. The severity of the impact is contingent on how Froala is implemented within the application and whether users can control content inside the editor (Bishop Fox).

Mitigation and workarounds

The vendor released a patch in version 3.2.7 on May 18, 2021. Users are advised to upgrade to at least version 3.2.7 and leverage the Full Feature configuration of the editor, as other configurations such as Full Page remained unpatched at the time of the advisory. Version 4.0, released on June 1, 2021, is also available as a more recent update (ZDNET, Bishop Fox).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-13828CRITICAL9
  • PHPPHP
  • mautic/core
NoYesDec 02, 2025
CVE-2025-13827HIGH8.8
  • PHPPHP
  • mautic/grapes-js-builder-bundle
NoYesDec 02, 2025
CVE-2025-66312MEDIUM6.2
  • PHPPHP
  • getgrav/grav
NoYesDec 01, 2025
CVE-2025-66311MEDIUM6.2
  • PHPPHP
  • getgrav/grav
NoYesDec 01, 2025
CVE-2025-66310MEDIUM6.2
  • PHPPHP
  • getgrav/grav
NoYesDec 01, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management