
Cloud Vulnerability DB
A community-led vulnerabilities database
A cross-site scripting (XSS) vulnerability was discovered in TinyMCE's content extraction code. When using the noneditable_regexp option, specially crafted HTML attributes containing malicious code were able to be executed when content was extracted from the editor (Tiny Docs, GitHub Advisory).
The vulnerability occurs when using the noneditable_regexp option in TinyMCE, where content within an attribute was not properly verified to match the configured regular expression before being added. This allowed attackers to inject and execute malicious JavaScript code through specially crafted HTML attributes (GitHub Advisory). The vulnerability has been assigned a CVSS v3.1 base score of 6.1 (Moderate) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N (GitHub Advisory).
The vulnerability could allow attackers to execute arbitrary JavaScript code within the context of the editor when content is extracted. This could potentially lead to unauthorized access to sensitive information or manipulation of editor content (OWASP XSS).
The vulnerability has been patched in TinyMCE versions 7.2.0, 6.8.4, and 5.11.0 LTS. Users are advised to upgrade to these versions or later. The fix ensures that any content within an attribute is properly verified to match the configured regular expression before being added (Tiny Docs).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."