
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-21910 affects TinyMCE versions before 5.10.0, exposing a cross-site scripting (XSS) vulnerability. The vulnerability was discovered and disclosed on January 3, 2024, impacting the URL processing logic of the image and link plugins in TinyMCE, a widely-used open source rich text editor (GitHub Advisory, NVD).
The vulnerability allows a remote and unauthenticated attacker to introduce crafted image or link URLs that would result in the execution of arbitrary JavaScript in an editing user's browser. The issue has been assigned a CVSS v3.1 base score of 6.1 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, no privileges required, and required user interaction (NVD).
The vulnerability impacts users while editing content in TinyMCE, allowing arbitrary JavaScript execution when updating an image or link using a specially crafted URL. However, the dangerous URLs are stripped in any content extracted from the editor, limiting the scope of the vulnerability (GitHub Advisory).
The vulnerability has been patched in TinyMCE version 5.10.0 through improved sanitization logic when updating URLs in the relevant plugins. For users unable to upgrade, alternative workarounds include disabling the image and link plugins (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."