A cross-site scripting (XSS) vulnerability was discovered in: the core parser and media
plugin. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.9 or lower and TinyMCE 5.2.1 or lower.
This vulnerability has been patched in TinyMCE 4.9.10 and 5.2.2 by improved HTML parsing and sanitization logic.
The workarounds available are:
setup: function(editor) {
editor.on('PreInit', function() {
editor.parser.addNodeFilter('#cdata', function(nodes) {
for (var i = 0; i < nodes.length; i++) {
nodes[i].remove();
}
});
});
}
Tiny Technologies would like to thank MichaΕ Bentkowski and intivesec for discovering these vulnerabilities.
https://www.tiny.cloud/docs/release-notes/release-notes522/#securityfixes
If you have any questions or comments about this advisory: