quickentity-editor-next is an open source, system local, video game asset editor. In affected versions HTML tags in entity names are not sanitised (XSS vulnerability). Allows arbitrary code execution within the browser sandbox, among other things, simply from loading a file containing a script tag in any entity name. This issue has been patched in version 1.28.1 of the application. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 25 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-03-06T18:12:47.593Z
Updated: 2025-02-25T15:01:03.696Z
Reserved: 2023-03-01T19:03:56.630Z
Link: CVE-2023-27472

Updated: 2024-08-02T12:09:43.602Z

Status : Modified
Published: 2023-03-06T19:15:10.483
Modified: 2024-11-21T07:52:58.480
Link: CVE-2023-27472

No data.