Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. mavon-editor
  4. ›
  5. GMS-2020-373

GMS-2020-373: Cross-Site Scripting in mavon-editor

September 3, 2020 (updated November 29, 2021)

All versions of mavon-editor are vulnerable to Cross-Site Scripting. The package fails to sanitize entered input, allowing attackers to execute arbitrary JavaScript in a victim’s browser. No fix is currently available. Consider using an alternative package until a fix is made available.

References

  • github.com/advisories/GHSA-jfcc-rm7f-xgf8
  • github.com/hinesboy/mavonEditor/commit/5592ec3761bd3b5a12ba6f99ce3c4057c6e33f72
  • github.com/hinesboy/mavonEditor/issues/472
  • github.com/hinesboy/mavonEditor/pull/548
  • snyk.io/vuln/SNYK-JS-MAVONEDITOR-459108
  • www.npmjs.com/advisories/1169
  • www.npmjs.com/package/mavon-editor

Code Behaviors & Features

Detect and mitigate GMS-2020-373 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.8.2

Fixed versions

  • 2.8.2

Solution

Upgrade to version 2.8.2 or above.

Source file

npm/mavon-editor/GMS-2020-373.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:13 +0000.