CVE-2025-14284
BaseFortify
Publication date: 2025-12-09
Last updated on: 2026-04-29
Assigner: Snyk
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tiptap | extension-link | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows execution of arbitrary JavaScript code via XSS, which can lead to session hijacking, exposure of sensitive information, or malware delivery. Such security issues can negatively impact compliance with standards like GDPR and HIPAA, which require protection of personal and sensitive data. Failure to prevent XSS vulnerabilities may result in unauthorized data access or breaches, thereby violating these regulations. Mitigating the vulnerability by upgrading to version 2.10.4 and applying best practices helps maintain compliance. [4]
Can you explain this vulnerability to me?
This vulnerability affects versions of the package @tiptap/extension-link before 2.10.4 and is a Cross-site Scripting (XSS) issue. It occurs because user input is not properly sanitized when setting or toggling links. An attacker can inject a javascript: URL payload into these link attributes, which can then execute arbitrary JavaScript code in the context of the application when triggered by user interaction.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to execute arbitrary JavaScript code within the application, potentially leading to unauthorized actions, data theft, session hijacking, or other malicious activities that compromise the security and integrity of the application and its users.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the @tiptap/extension-link package to version 2.10.4 or later, as versions before 2.10.4 are vulnerable to Cross-site Scripting (XSS) due to unsanitized user input. Avoid using or allowing javascript: URL payloads in link settings or toggling until the update is applied.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking if your application uses @tiptap/extension-link versions prior to 2.10.4 and by testing if the editor allows insertion of links with javascript: URI schemes that execute scripts when clicked. A practical detection method is to attempt to insert a link with a payload such as `javascript:alert('XSS')` into the editor and then interact with the link to see if the script executes. There are no specific network commands provided, but manual testing in the application or automated scanning for vulnerable package versions is recommended. Additionally, you can use the exported `isAllowedUri` function from the patched extension to validate URIs programmatically. Monitoring for suspicious link inputs or unexpected script execution in the application context can also help detect exploitation attempts. [2, 3, 4]