Vulnerability Details CVE-2023-26123
Versions of the package raysan5/raylib before 4.5.0 are vulnerable to Cross-site Scripting (XSS) such that the SetClipboardText API does not properly escape the ' character, allowing attacker-controlled input to break out of the string and execute arbitrary JavaScript via emscripten_run_script function.
**Note:** This vulnerability is present only when compiling raylib for PLATFORM_WEB. All the other Desktop/Mobile/Embedded platforms are not affected.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 27.3%
CVSS Severity
CVSS v3 Score 6.1
Products affected by CVE-2023-26123
-
cpe:2.3:a:raylib:raylib:1.0.4
-
cpe:2.3:a:raylib:raylib:1.0.6
-
cpe:2.3:a:raylib:raylib:1.1.1
-
cpe:2.3:a:raylib:raylib:1.2.2
-
cpe:2.3:a:raylib:raylib:1.3.0
-
cpe:2.3:a:raylib:raylib:1.4.0
-
cpe:2.3:a:raylib:raylib:1.5.0
-
cpe:2.3:a:raylib:raylib:1.6.0
-
cpe:2.3:a:raylib:raylib:1.7.0
-
cpe:2.3:a:raylib:raylib:1.8.0
-
cpe:2.3:a:raylib:raylib:1.9.4
-
cpe:2.3:a:raylib:raylib:1.9.7
-
cpe:2.3:a:raylib:raylib:2.0.0
-
cpe:2.3:a:raylib:raylib:2.5.0
-
cpe:2.3:a:raylib:raylib:2.6.0
-
cpe:2.3:a:raylib:raylib:3.0.0
-
cpe:2.3:a:raylib:raylib:3.5.0
-
cpe:2.3:a:raylib:raylib:3.7.0
-
cpe:2.3:a:raylib:raylib:4.0.0
-
cpe:2.3:a:raylib:raylib:4.2.0