{"vulnerability": "CVE-2024-45613", "sightings": [{"uuid": "90fc544a-efbb-4769-98e6-a036f9e5e09f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45613", "type": "seen", "source": "https://t.me/cvedetector/6316", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45613 - CKEditor 5 Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45613 \nPublished : Sept. 25, 2024, 2:15 p.m. | 32\u00a0minutes ago \nDescription : CKEditor 5 is a JavaScript rich-text editor. Starting in version 40.0.0 and prior to version 43.1.1, a Cross-Site Scripting (XSS) vulnerability is present in the CKEditor 5 clipboard package. This vulnerability could be triggered by a specific user action, leading to unauthorized JavaScript code execution, if the attacker managed to insert a malicious content into the editor, which might happen with a very specific editor configuration. This vulnerability only affects installations where the Block Toolbar plugin is enabled and either the General HTML Support (with a configuration that permits unsafe markup) or the HTML Embed plugin is also enabled. A fix for the problem is available in version 43.1.1. As a workaround, one may disable the block toolbar plugin. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-25T16:50:01.000000Z"}]}