{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T13:32:57.609","vulnerabilities":[{"cve":{"id":"CVE-2022-23461","sourceIdentifier":"security-advisories@github.com","published":"2022-09-24T03:15:08.683","lastModified":"2024-11-21T06:48:36.370","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Jodit Editor is a WYSIWYG editor written in pure TypeScript without the use of additional libraries. Jodit Editor is vulnerable to XSS attacks when pasting specially constructed input. This issue has not been fully patched. There are no known workarounds."},{"lang":"es","value":"Jodit Editor es un editor WYSIWYG escrito en TypeScript puro sin el uso de bibliotecas adicionales. Jodit Editor es vulnerable a ataques de tipo XSS cuando son pegadas entradas especialmente construidas.\n"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:xdsoft:jodit_editor:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndIncluding":"3.20.4","matchCriteriaId":"5017EB66-6232-4F3E-AD15-693B4F42F2D3"}]}]}],"references":[{"url":"https://securitylab.github.com/advisories/GHSL-2022-030_xdan_jodit/","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://securitylab.github.com/advisories/GHSL-2022-030_xdan_jodit/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}