Versions of the package @tiptap/extension-link before 2.10.4 are vulnerable to Cross-site Scripting (XSS) due to unsanitized user input allowed in setting or toggling links. An attacker can execute arbitrary JavaScript code in the context of the application by injecting a javascript: URL payload into these attributes, which is then triggered either by user interaction.
References
| Link | Resource |
|---|---|
| https://gist.github.com/th4s1s/3d1b6cd3e7257b14947242f712ec6e1f | Exploit Third Party Advisory |
| https://github.com/ueberdosis/tiptap/commit/1c2fefe3d61ab1c8fbaa6d6b597251e1b6d9aaed | Patch |
| https://github.com/ueberdosis/tiptap/releases/tag/v2.10.4 | Release Notes |
| https://security.snyk.io/vuln/SNYK-JS-TIPTAPEXTENSIONLINK-14222197 | Third Party Advisory |
| https://gist.github.com/th4s1s/3d1b6cd3e7257b14947242f712ec6e1f | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-09 16:17
Updated : 2025-12-31 01:12
NVD link : CVE-2025-14284
Mitre link : CVE-2025-14284
CVE.ORG link : CVE-2025-14284
JSON object : View
Products Affected
tiptap
- tiptap\/extension-link
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
