
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-46812 affects Trix, a what-you-see-is-what-you-get rich text editor for everyday writing. The vulnerability was discovered and disclosed on May 8, 2025, affecting all versions prior to 2.1.15. This security issue involves a Cross-Site Scripting (XSS) vulnerability that occurs when users paste malicious code into the editor (GitHub Advisory, NVD).
The vulnerability stems from insufficient sanitization of pasted content in the HTML parser component. The issue was addressed by implementing additional security measures in the HTML sanitization process, specifically by adding the SAFEFORXML option to the DOMPurify configuration. The vulnerability has been assigned a CVSS v4.0 score of LOW with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P (NVD).
When exploited, this vulnerability allows attackers to execute arbitrary JavaScript code within the context of the user's session. This could potentially lead to unauthorized actions being performed or sensitive information being disclosed when users unknowingly paste malicious content into the editor (GitHub Advisory).
The vulnerability has been patched in version 2.1.15 of Trix. Users are strongly recommended to upgrade to this version or later to protect against this security issue. The fix involves implementing enhanced HTML sanitization using the SAFEFORXML option in the DOMPurify configuration (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."