CVE-2021-33829
Description
A cross-site scripting (XSS) vulnerability in the HTML Data Processor in CKEditor 4 4.14.0 through 4.16.x before 4.16.1 allows remote attackers to inject executable JavaScript code through a crafted comment because --!> is mishandled.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CKEditor 4 versions 4.14.0 through 4.16.0 contain a stored XSS vulnerability via crafted HTML comments, fixed in 4.16.1.
Vulnerability
A cross-site scripting (XSS) vulnerability exists in the HTML Data Processor of CKEditor 4, affecting versions 4.14.0 through 4.16.x before 4.16.1 [1]. The flaw arises from the mishandling of --!> sequences within crafted HTML comments, allowing an attacker to inject executable JavaScript code [1][3].
Exploitation
An attacker can exploit this by supplying a specially crafted HTML comment containing the --!> string to a victim who uses CKEditor 4 in a web application. No special authentication or network position is required; the attack can be delivered via any user-generated content that is processed by the editor's HTML Data Processor [1]. The malicious payload executes when the content is rendered in a browser.
Impact
Successful exploitation enables arbitrary JavaScript execution in the context of the victim's session within the application using CKEditor 4. This can lead to data theft (e.g., session cookies, tokens), content manipulation, or further compromise of the application. The impact is typical of a stored XSS vulnerability with full scope of the browser session [1][3].
Mitigation
CKEditor 4.16.1, released on June 8, 2021, fixes this vulnerability by properly handling --!> in comments [1][3]. Users should upgrade to version 4.16.1 or later. As of June 30, 2023, CKEditor 4 reached its End of Life (EOL) and no longer receives security updates; the open-source version (4.22.1 and below) is also EOL [2]. For continued support, commercial CKEditor 4 LTS is available until December 2028 [2]. Migrating to CKEditor 5 is strongly recommended as the long-term solution [1][2].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
ckeditor4npm | >= 4.14.0, < 4.16.1 | 4.16.1 |
drupal/corePackagist | >= 7.0.0, < 7.80 | 7.80 |
drupal/corePackagist | >= 8.0.0, < 8.9.16 | 8.9.16 |
drupal/corePackagist | >= 9.0.0, < 9.0.14 | 9.0.14 |
drupal/corePackagist | >= 9.1.0, < 9.1.9 | 9.1.9 |
drupal/drupalPackagist | >= 7.0.0, < 7.80 | 7.80 |
drupal/drupalPackagist | >= 8.0.0, < 8.9.16 | 8.9.16 |
drupal/drupalPackagist | >= 9.0.0, < 9.0.14 | 9.0.14 |
drupal/drupalPackagist | >= 9.1.0, < 9.1.9 | 9.1.9 |
Affected products
5- CKEditor/CKEditor 4description
- osv-coords4 versions
>= 8.9.0, < 8.9.16+ 3 more
- (no CPE)range: >= 8.9.0, < 8.9.16
- (no CPE)range: >= 7.0.0, < 7.80
- (no CPE)range: >= 7.0.0, < 7.80
- (no CPE)range: >= 4.14.0, < 4.16.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- github.com/advisories/GHSA-rgx6-rjj4-c388ghsaADVISORY
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/mitrevendor-advisoryx_refsource_FEDORA
- nvd.nist.gov/vuln/detail/CVE-2021-33829ghsaADVISORY
- ckeditor.com/blog/ckeditor-4.16.1-with-accessibility-enhancements/ghsax_refsource_MISCWEB
- github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/CVE-2021-33829.yamlghsaWEB
- github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2021-33829.yamlghsaWEB
- lists.debian.org/debian-lts-announce/2021/11/msg00007.htmlghsamailing-listx_refsource_MLISTWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3TghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGWghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XDghsaWEB
- www.drupal.org/sa-core-2021-003ghsax_refsource_CONFIRMWEB
- www.npmjs.com/package/ckeditor4ghsaWEB
News mentions
0No linked articles in our index yet.