GHSA-g9jg-w8vm-g96v

Suggest an improvement
Source
https://github.com/advisories/GHSA-g9jg-w8vm-g96v
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/12/GHSA-g9jg-w8vm-g96v/GHSA-g9jg-w8vm-g96v.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-g9jg-w8vm-g96v
Related
Published
2025-12-31T22:07:25Z
Modified
2026-02-04T02:55:42.586338Z
Severity
  • 4.6 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N CVSS Calculator
Summary
Trix has a stored XSS vulnerability through its attachment attribute
Details

Impact

The Trix editor, in versions prior to 2.1.16, is vulnerable to XSS attacks through attachment payloads.

An attacker could inject malicious code into a data-trix-attachment attribute that, when rendered as HTML and clicked on, could execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed.

Patches

Update Recommendation: Users should upgrade to Trix editor version 2.1.16 or later.

Resources

The XSS vulnerability was reported by HackerOne researcher michaelcheers.

Database specific
{
    "github_reviewed_at": "2025-12-31T22:07:25Z",
    "severity": "MODERATE",
    "cwe_ids": [
        "CWE-79"
    ],
    "github_reviewed": true,
    "nvd_published_at": null
}
References

Affected packages

npm / trix

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.16

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/12/GHSA-g9jg-w8vm-g96v/GHSA-g9jg-w8vm-g96v.json"

RubyGems / action_text-trix

Package

Name
action_text-trix
Purl
pkg:gem/action_text-trix

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.16

Affected versions

0.*
0.0.1
2.*
2.1.15

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/12/GHSA-g9jg-w8vm-g96v/GHSA-g9jg-w8vm-g96v.json"