Skip to content

TinyMCE Cross-Site Scripting (XSS) vulnerability using noscript elements

Moderate severity GitHub Reviewed Published Jun 19, 2024 in tinymce/tinymce • Updated Jul 2, 2024

Package

nuget TinyMCE (NuGet)

Affected versions

< 5.11.0
>= 6.0.0, < 6.8.4
>= 7.0.0, < 7.2.0

Patched versions

5.11.0
6.8.4
7.2.0
pip django-tinymce (pip)
<= 4.0.0
4.1.0
npm tinymce (npm)
< 5.11.0
>= 6.0.0, < 6.8.4
>= 7.0.0, < 7.2.0
5.11.0
6.8.4
7.2.0
composer tinymce/tinymce (Composer)
< 5.11.0
>= 6.0.0, < 6.8.4
>= 7.0.0, < 7.2.0
5.11.0
6.8.4
7.2.0

Description

Impact

A cross-site scripting (XSS) vulnerability was discovered in TinyMCE’s content parsing code. This allowed specially crafted noscript elements containing malicious code to be executed when that content was loaded into the editor.

Patches

This vulnerability has been patched in TinyMCE 7.2.0, TinyMCE 6.8.4 and TinyMCE 5.11.0 LTS by ensuring that content within noscript elements are properly parsed.

Fix

To avoid this vulnerability:

  • Upgrade to TinyMCE 7.2.0 or higher.
  • Upgrade to TinyMCE 6.8.4 or higher for TinyMCE 6.x.
  • Upgrade to TinyMCE 5.11.0 LTS or higher for TinyMCE 5.x (only available as part of commercial long-term support contract).

Acknowledgements

Tiny thanks Malav Khatri and another reporter for their help identifying this vulnerability.

References

For more information

If you have any questions or comments about this advisory:

References

@EkimChau EkimChau published to tinymce/tinymce Jun 19, 2024
Published to the GitHub Advisory Database Jun 19, 2024
Reviewed Jun 19, 2024
Published by the National Vulnerability Database Jun 19, 2024
Last updated Jul 2, 2024

Severity

Moderate
6.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Weaknesses

CVE ID

CVE-2024-38357

GHSA ID

GHSA-w9jx-4g6g-rp7x

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.