A cross-site scripting (XSS) vulnerability was discovered in the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.10 or lower and TinyMCE 5.4.0 or lower.
This vulnerability has been patched in TinyMCE 4.9.11 and 5.4.1 by improved HTML parsing and sanitization logic.
The workarounds available are: - upgrade to either TinyMCE 4.9.11 or TinyMCE 5.4.1 or - enable the media plugin, which overrides the default parsing behaviour for iframes or - add the following workaround to update the parsing schema rules for iframes:
setup: function(editor) {
editor.on('PreInit', function() {
editor.schema.getSpecialElements()['iframe'] = /</iframe[^>]*>/gi;
});
}
Tiny Technologies would like to thank George Steketee and Chris Davis at Bishop Fox for discovering this vulnerability.
https://www.tiny.cloud/docs/release-notes/release-notes54/#securityfixes
If you have any questions or comments about this advisory: * Open an issue in the TinyMCE repo * Email us at infosec@tiny.cloud
{ "nvd_published_at": "2020-08-14T14:15:00Z", "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2020-08-10T22:39:05Z" }