Description
It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin).
Remediation
References
https://ckeditor.com/blog/CKEditor-4.16-with-improved-image-pasting-High-Contrast-support-and-a-new-color-API/#security-comes-first
https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-416
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
Related Vulnerabilities
CVE-2023-32982 Vulnerability in maven package org.jenkins-ci.plugins:ansible
CVE-2021-36374 Vulnerability in maven package org.apache.ant:ant
CVE-2021-41561 Vulnerability in maven package org.apache.parquet:parquet
CVE-2022-28220 Vulnerability in maven package org.apache.james:james-server-protocols-imap4
CVE-2022-43403 Vulnerability in maven package org.jenkins-ci.plugins:script-security