CVE-2024-38356

medium

Description

TinyMCE is an open source rich text editor. A cross-site scripting (XSS) vulnerability was discovered in TinyMCE’s content extraction code. When using the `noneditable_regexp` option, specially crafted HTML attributes containing malicious code were able to be executed when content was extracted from the editor. This vulnerability has been patched in TinyMCE 7.2.0, TinyMCE 6.8.4 and TinyMCE 5.11.0 LTS by ensuring that, when using the `noneditable_regexp` option, any content within an attribute is properly verified to match the configured regular expression before being added. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

https://www.tiny.cloud/docs/tinymce/7/7.2-release-notes/#overview

https://www.tiny.cloud/docs/tinymce/6/6.8.4-release-notes/#overview

https://owasp.org/www-community/attacks/xss

https://github.com/tinymce/tinymce/security/advisories/GHSA-9hcv-j9pv-qmph

https://github.com/tinymce/tinymce/commit/5acb741665a98e83d62b91713c800abbff43b00d

Details

Source: Mitre, NVD

Published: 2024-06-19

Updated: 2024-06-20

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 6.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Severity: Medium

CVSS v4

Base Score: 5.3

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:L

Severity: Medium

EPSS

EPSS: 0.00352