CVE-2025-46812

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-46812
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-46812.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-46812
Aliases
Published
2025-05-08T20:15:30Z
Modified
2025-05-19T10:20:06.138276Z
Summary
[none]
Details

Trix is a what-you-see-is-what-you-get rich text editor for everyday writing. Versions prior to 2.1.15 are vulnerable to XSS attacks when pasting malicious code. An attacker could trick a user to copy and paste malicious code that would execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed. This issue has been patched in version 2.1.15.

References

Affected packages

Git / github.com/basecamp/trix

Affected ranges

Type
GIT
Repo
https://github.com/basecamp/trix
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.10.0
0.10.1
0.10.2
0.11.0
0.11.1
0.11.2
0.11.3
0.11.4
0.12.0
0.12.1
0.5.0
0.8.0
0.9.0
0.9.1
0.9.10
0.9.2
0.9.3
0.9.4
0.9.5
0.9.6
0.9.7
0.9.8
0.9.9

1.*

1.0.0
1.1.0
1.1.1
1.2.0
1.2.1
1.2.2
1.2.3
1.2.4
1.3.0
1.3.1

2.*

2.1.3

v2.*

v2.0.0
v2.0.0-alpha.0
v2.0.0-alpha.1
v2.0.0-beta.0
v2.0.0-beta.1
v2.0.1
v2.0.10
v2.0.2
v2.0.3
v2.0.4
v2.0.5
v2.0.6
v2.0.7
v2.0.8
v2.0.9
v2.1.0
v2.1.1
v2.1.10
v2.1.11
v2.1.12
v2.1.13
v2.1.14
v2.1.4
v2.1.5
v2.1.6
v2.1.7
v2.1.8
v2.1.9