This repository was archived by the owner on Aug 26, 2025. It is now read-only.
[PROD](renovate) Update dependency ckeditor/ckeditor to v4.24.0 [SECURITY] #575
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
4.20.1->4.24.0GitHub Vulnerability Alerts
CVE-2024-24815
Affected packages
The vulnerability has been discovered in the core HTML parsing module and may affect all editor instances that:
scriptandstyleelements).Impact
A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed HTML content bypassing Advanced Content Filtering mechanism, which could result in executing JavaScript code. An attacker could abuse faulty CDATA content detection and use it to prepare an intentional attack on the editor. It affects all users using the CKEditor 4 at version < 4.24.0-lts.
Patches
The problem has been recognized and patched. The fix will be available in version 4.24.0-lts.
For more information
Email us at [email protected] if you have any questions or comments about this advisory.
Acknowledgements
The CKEditor 4 team would like to thank Michal Frýba from ALEF NULA for recognizing and reporting this vulnerability.
Release Notes
ckeditor/ckeditor4-releases (ckeditor/ckeditor)
v4.24.0Compare Source
Security Updates:
Fixed cross-site scripting (XSS) vulnerability caused by incorrect CDATA detection reported by Michal Frýba, ALEF NULA.
Issue summary: The vulnerability allowed to inject malformed HTML content bypassing Advanced Content Filtering mechanism, which could result in executing JavaScript code. See GHA for more details.
Fixed cross-site scripting (XSS) vulnerability in AJAX sample reported by Rafael Pedrero, see INCIBE report.
Issue summary: The vulnerability allowed to execute JavaScript code by abusing the AJAX sample. See GHA for more details.
Cross-site scripting (XSS) vulnerability in samples with enabled the preview feature reported by Marcin Wyczechowski & Michał Majchrowicz, AFINE Team.
Issue summary: The vulnerability allowed to execute JavaScript code by abusing the misconfigured preview feature. See GHA for more details.
You can read more details in the relevant security advisories. Contact us if you have more questions.
An upgrade is highly recommended!
Fixed Issues:
v4.23.0Compare Source
This release introduces the LTS (”Long Term Support”) version of the editor, available under commercial terms ("Extended Support Model").
If you acquired the Extended Support Model for CKEditor 4 LTS, please read the CKEditor 4 LTS key activation guide.
v4.22.1Compare Source
New Features:
config.styleSetconfiguration option.config.versionCheckconfiguration option to learn more.Fixed Issues:
Other Changes:
document.domainin Firefox in the Preview plugin.Note: CKEditor 4.22.1 has been released immediately after 4.22.0 to fix the README issues on npm and contains no changes vs 4.22.0.
v4.22.0Compare Source
New Features:
config.styleSetconfiguration option.config.versionCheckconfiguration option to learn more.Fixed Issues:
Other Changes:
document.domainin Firefox in the Preview plugin.Note: CKEditor 4.22.1 has been released immediately after 4.22.0 to fix the README issues on npm and contains no changes vs 4.22.0.
v4.21.0Compare Source
Security Updates:
A cross-site scripting vulnerability has been discovered affecting Iframe Dialog and Media Embed plugins.
This vulnerability might affect a small percentage of integrators that depend on dynamic editor initialization/destroy mechanism. See GitHub advisory for more details.
Potential breaking changes
In some rare cases, a security release may introduce a breaking change to your application. We have provided configuration options that will help you mitigate any potential issues with the upgrade:
sandboxattribute by default, which restricts JavaScript code execution in the iframe element. To change this behavior, configure theconfig.iframe_attributesoption.config.embed_keepOriginalContentoption.If you choose to change either of the above options, make sure to properly configure Content Security Policy to avoid any potential security issues that may arise from embedding iframe elements on your web page.
You can read more details in the relevant security advisory and contact us if you have more questions.
An upgrade is highly recommended!
New Features:
config.uploadImage_supportedTypesconfiguration option allowing to change the image formats accepted by the Upload Image plugin. Thanks to SilverYoCha!Fixed Issues:
v4.20.2Compare Source
Fixed Issues:
popstateandhashchangeevents on thewindow, added by the Maximize plugin, were not removed when destroying the editor instance.changeevent upon finishing upload, resulting in passing incorrect data in form controls for integration frameworks, like Reactive forms in Angular.API changes:
colorButton_contentsCssconfiguration option allowing to add custom CSS to the Color Button menu content. Thanks to mihilion!Configuration
📅 Schedule: Branch creation - "" in timezone Europe/Warsaw, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.