CVE-2025-14284: @tiptap/extension-link vulnerable to Cross-site Scripting (XSS)
(updated )
Versions of the package @tiptap/extension-link before 2.10.4 are vulnerable to Cross-site Scripting (XSS) due to unsanitized user input allowed in setting or toggling links. An attacker can execute arbitrary JavaScript code in the context of the application by injecting a javascript: URL payload into these attributes, which is then triggered either by user interaction.
References
- gist.github.com/th4s1s/3d1b6cd3e7257b14947242f712ec6e1f
- github.com/advisories/GHSA-vhrc-hgrq-x75r
- github.com/ueberdosis/tiptap
- github.com/ueberdosis/tiptap/commit/1c2fefe3d61ab1c8fbaa6d6b597251e1b6d9aaed
- github.com/ueberdosis/tiptap/releases/tag/v2.10.4
- nvd.nist.gov/vuln/detail/CVE-2025-14284
- security.snyk.io/vuln/SNYK-JS-TIPTAPEXTENSIONLINK-14222197
Code Behaviors & Features
Detect and mitigate CVE-2025-14284 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →