VYPR
Moderate severityNVD Advisory· Published Jun 9, 2021· Updated Aug 3, 2024

CVE-2021-33829

CVE-2021-33829

Description

A cross-site scripting (XSS) vulnerability in the HTML Data Processor in CKEditor 4 4.14.0 through 4.16.x before 4.16.1 allows remote attackers to inject executable JavaScript code through a crafted comment because --!> is mishandled.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CKEditor 4 versions 4.14.0 through 4.16.0 contain a stored XSS vulnerability via crafted HTML comments, fixed in 4.16.1.

Vulnerability

A cross-site scripting (XSS) vulnerability exists in the HTML Data Processor of CKEditor 4, affecting versions 4.14.0 through 4.16.x before 4.16.1 [1]. The flaw arises from the mishandling of --!> sequences within crafted HTML comments, allowing an attacker to inject executable JavaScript code [1][3].

Exploitation

An attacker can exploit this by supplying a specially crafted HTML comment containing the --!> string to a victim who uses CKEditor 4 in a web application. No special authentication or network position is required; the attack can be delivered via any user-generated content that is processed by the editor's HTML Data Processor [1]. The malicious payload executes when the content is rendered in a browser.

Impact

Successful exploitation enables arbitrary JavaScript execution in the context of the victim's session within the application using CKEditor 4. This can lead to data theft (e.g., session cookies, tokens), content manipulation, or further compromise of the application. The impact is typical of a stored XSS vulnerability with full scope of the browser session [1][3].

Mitigation

CKEditor 4.16.1, released on June 8, 2021, fixes this vulnerability by properly handling --!> in comments [1][3]. Users should upgrade to version 4.16.1 or later. As of June 30, 2023, CKEditor 4 reached its End of Life (EOL) and no longer receives security updates; the open-source version (4.22.1 and below) is also EOL [2]. For continued support, commercial CKEditor 4 LTS is available until December 2028 [2]. Migrating to CKEditor 5 is strongly recommended as the long-term solution [1][2].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
ckeditor4npm
>= 4.14.0, < 4.16.14.16.1
drupal/corePackagist
>= 7.0.0, < 7.807.80
drupal/corePackagist
>= 8.0.0, < 8.9.168.9.16
drupal/corePackagist
>= 9.0.0, < 9.0.149.0.14
drupal/corePackagist
>= 9.1.0, < 9.1.99.1.9
drupal/drupalPackagist
>= 7.0.0, < 7.807.80
drupal/drupalPackagist
>= 8.0.0, < 8.9.168.9.16
drupal/drupalPackagist
>= 9.0.0, < 9.0.149.0.14
drupal/drupalPackagist
>= 9.1.0, < 9.1.99.1.9

Affected products

5

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

14

News mentions

0

No linked articles in our index yet.