
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2023-26149 affects versions of the quill-mention package before 4.0.0, exposing a Cross-site Scripting (XSS) vulnerability due to improper user-input sanitization in the renderList function. The vulnerability was disclosed on September 26, 2023, and published on September 27, 2023. This security issue specifically impacts the @mentions functionality in the Quill rich text editor (Snyk Advisory).
The vulnerability stems from the use of innerHTML without proper sanitization in the renderList function. When the mentions list contains unsafe (user-sourced) data, it could enable an injection attack when a user triggers the @ mention feature. The vulnerability has been assigned a CVSS v3.1 base score of 6.1 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating network accessibility with low attack complexity but requiring user interaction (Snyk Advisory).
If exploited, this XSS vulnerability could lead to cookie theft, session hijacking, exposure of sensitive information, access to privileged services and functionality, and potential malware delivery. The vulnerability affects the confidentiality and integrity of the application, though there is no direct impact on availability (Snyk Advisory).
The recommended mitigation is to upgrade quill-mention to version 4.0.0 or higher, which implements proper input sanitization. The fix involves changing the renderItem function to return a DOMElement that uses textContent rather than innerHTML. For custom implementations, developers should ensure that HTML rendering is handled through custom blots that extend the default MentionBlot and implement a render method returning a sanitized Element (GitHub PR).
The security community responded positively to the fix, with the pull request receiving approval from core maintainers. The changes were noted as a breaking change, requiring a major version bump and the addition of upgrade notes in the documentation. The fix was merged and version 4.0.0 was published to npm with updated security measures (GitHub PR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”