CVE-2025-14284
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-09

Last updated on: 2026-04-29

Assigner: Snyk

Description
Versions of the package @tiptap/extension-link before 2.10.4 are vulnerable to Cross-site Scripting (XSS) due to unsanitized user input allowed in setting or toggling links. An attacker can execute arbitrary JavaScript code in the context of the application by injecting a javascript: URL payload into these attributes, which is then triggered either by user interaction.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-09
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-12-10
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tiptap extension-link *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows execution of arbitrary JavaScript code via XSS, which can lead to session hijacking, exposure of sensitive information, or malware delivery. Such security issues can negatively impact compliance with standards like GDPR and HIPAA, which require protection of personal and sensitive data. Failure to prevent XSS vulnerabilities may result in unauthorized data access or breaches, thereby violating these regulations. Mitigating the vulnerability by upgrading to version 2.10.4 and applying best practices helps maintain compliance. [4]


Can you explain this vulnerability to me?

This vulnerability affects versions of the package @tiptap/extension-link before 2.10.4 and is a Cross-site Scripting (XSS) issue. It occurs because user input is not properly sanitized when setting or toggling links. An attacker can inject a javascript: URL payload into these link attributes, which can then execute arbitrary JavaScript code in the context of the application when triggered by user interaction.


How can this vulnerability impact me? :

The vulnerability can allow an attacker to execute arbitrary JavaScript code within the application, potentially leading to unauthorized actions, data theft, session hijacking, or other malicious activities that compromise the security and integrity of the application and its users.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the @tiptap/extension-link package to version 2.10.4 or later, as versions before 2.10.4 are vulnerable to Cross-site Scripting (XSS) due to unsanitized user input. Avoid using or allowing javascript: URL payloads in link settings or toggling until the update is applied.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if your application uses @tiptap/extension-link versions prior to 2.10.4 and by testing if the editor allows insertion of links with javascript: URI schemes that execute scripts when clicked. A practical detection method is to attempt to insert a link with a payload such as `javascript:alert('XSS')` into the editor and then interact with the link to see if the script executes. There are no specific network commands provided, but manual testing in the application or automated scanning for vulnerable package versions is recommended. Additionally, you can use the exported `isAllowedUri` function from the patched extension to validate URIs programmatically. Monitoring for suspicious link inputs or unexpected script execution in the application context can also help detect exploitation attempts. [2, 3, 4]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart