A cross-site scripting (XSS) vulnerability was discovered in the URL processing logic of the image
and link
plugins. The vulnerability allowed arbitrary JavaScript execution when updating an image or link using a specially crafted URL. This issue only impacted users while editing and the dangerous URLs were stripped in any content extracted from the editor. This impacts all users who are using TinyMCE 5.9.2 or lower.
This vulnerability has been patched in TinyMCE 5.10.0 by improved sanitization logic when updating URLs in the relevant plugins.
To work around this vulnerability, either:
- Upgrade to TinyMCE 5.10.0 or higher
- Disable the image
and link
plugins
Tiny Technologies would like to thank Yakir6 for discovering this vulnerability.
https://www.tiny.cloud/docs/release-notes/release-notes510/#securityfixes
If you have any questions or comments about this advisory: * Email us at infosec@tiny.cloud * Open an issue in the TinyMCE repo
{ "nvd_published_at": null, "cwe_ids": [ "CWE-64", "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2021-11-01T20:02:43Z" }