Vulnerability DatabaseGHSA-9j5w-2cqc-cwj9

GHSA-9j5w-2cqc-cwj9
PHP vulnerability analysis and mitigation

Overview

A stored XSS vulnerability (GHSA-9j5w-2cqc-cwj9) was discovered in OpenMage's TinyMCE WYSIWYG editor affecting versions prior to 20.2.0. The vulnerability was identified through a HackerOne report by security researcher Halit AKAYDIN. The vulnerability affects the TinyMCE editor component, which failed to properly filter scripts when rendering HTML in specially crafted HTML tags (GitHub Advisory).

Technical details

The vulnerability is classified as High severity with a CVSS score of 7.5. The attack exploits the 'onmouseover' attribute of img elements, allowing for script execution through specially crafted HTML tags. The CVSS vector string is CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:L, indicating network attack vector, low attack complexity, high privileges required, and user interaction required (GitHub Advisory).

Impact

The vulnerability could lead to stored XSS attacks, potentially compromising data confidentiality (High impact), data integrity (Low impact), and system availability (Low impact). The scope is changed, meaning the vulnerable component can impact resources beyond its security scope (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in OpenMage version 20.2.0 by upgrading TinyMCE to version 6.7.1. For users unable to upgrade immediately, temporary workarounds include disabling the WYSIWYG editor features in the configuration or implementing WAF appliances to filter potential attacks (OpenMage Release).

Community reactions

The vulnerability was addressed as part of a major update to OpenMage's core components, with the TinyMCE editor being upgraded from version 3 to version 6.7.1. The community responded positively to this security update, recognizing it as a significant improvement to the platform's security posture (OpenMage Release).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23492HIGH8.8
  • PHPPHP
  • pimcore/pimcore
NoYesJan 14, 2026
CVE-2026-23498HIGH7.2
  • PHPPHP
  • shopware/core
NoYesJan 14, 2026
GHSA-595p-g7xc-c333MEDIUM6.9
  • PHPPHP
  • algolia/algoliasearch-magento-2
NoYesJan 14, 2026
CVE-2022-50807MEDIUM6.9
  • PHPPHP
  • concrete5/concrete5
NoNoJan 13, 2026
CVE-2026-0859MEDIUM5.2
  • PHPPHP
  • typo3/cms-core
NoYesJan 13, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management