Versions of the package raysan5/raylib before 4.5.0 are vulnerable to Cross-site Scripting (XSS) such that the SetClipboardText API does not properly escape the ' character, allowing attacker-controlled input to break out of the string and execute arbitrary JavaScript via emscripten_run_script function. **Note:** This vulnerability is present only when compiling raylib for PLATFORM_WEB. All the other Desktop/Mobile/Embedded platforms are not affected.
History

Thu, 06 Feb 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published: 2023-04-14T05:00:01.188Z

Updated: 2025-02-06T20:42:47.318Z

Reserved: 2023-02-20T10:28:48.923Z

Link: CVE-2023-26123

cve-icon Vulnrichment

Updated: 2024-08-02T11:39:06.852Z

cve-icon NVD

Status : Modified

Published: 2023-04-14T05:15:13.867

Modified: 2025-02-06T21:15:18.370

Link: CVE-2023-26123

cve-icon Redhat

No data.