CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
AI Score
Confidence
High
TinyMCE is an open source rich text editor. A cross-site scripting (XSS)
vulnerability was discovered in TinyMCE’s content extraction code. When
using the noneditable_regexp
option, specially crafted HTML attributes
containing malicious code were able to be executed when content was
extracted from the editor. This vulnerability has been patched in TinyMCE
7.2.0, TinyMCE 6.8.4 and TinyMCE 5.11.0 LTS by ensuring that, when using
the noneditable_regexp
option, any content within an attribute is
properly verified to match the configured regular expression before being
added. Users are advised to upgrade. There are no known workarounds for
this vulnerability.
Author | Note |
---|---|
rodrigo-zaiden | roundcube includes tinymce source |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | roundcube | < any | UNKNOWN |
ubuntu | 20.04 | noarch | roundcube | < any | UNKNOWN |
ubuntu | 22.04 | noarch | roundcube | < any | UNKNOWN |
ubuntu | 24.04 | noarch | roundcube | < any | UNKNOWN |
ubuntu | 16.04 | noarch | roundcube | < any | UNKNOWN |
ubuntu | 18.04 | noarch | tinymce | < any | UNKNOWN |
ubuntu | 20.04 | noarch | tinymce | < any | UNKNOWN |
ubuntu | 16.04 | noarch | tinymce | < any | UNKNOWN |
github.com/tinymce/tinymce/commit/5acb741665a98e83d62b91713c800abbff43b00d
github.com/tinymce/tinymce/security/advisories/GHSA-9hcv-j9pv-qmph
launchpad.net/bugs/cve/CVE-2024-38356
nvd.nist.gov/vuln/detail/CVE-2024-38356
owasp.org/www-community/attacks/xss
security-tracker.debian.org/tracker/CVE-2024-38356
www.cve.org/CVERecord?id=CVE-2024-38356
www.tiny.cloud/docs/tinymce/6/6.8.4-release-notes/#overview
www.tiny.cloud/docs/tinymce/7/7.2-release-notes/#overview