Description
Versions of the package @tiptap/extension-link before 2.10.4 are vulnerable to Cross-site Scripting (XSS) due to unsanitized user input allowed in setting or toggling links. An attacker can execute arbitrary JavaScript code in the context of the application by injecting a javascript: URL payload into these attributes, which is then triggered either by user interaction.
References (4)
Core 4
Core References
Exploit, Third Party Advisory
https://gist.github.com/th4s1s/3d1b6cd3e7257b14947242f712ec6e1f
Third Party Advisory
https://security.snyk.io/vuln/SNYK-JS-TIPTAPEXTENSIONLINK-14222197
Scores
CVSS v3
6.1
EPSS
0.0007
EPSS Percentile
21.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (2)
tiptap/extension-link
0 - 2.10.4npm
tiptap/tiptap\/extension-link
< 2.10.4
Published
Dec 09, 2025
Tracked Since
Feb 18, 2026