CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
AI Score
Confidence
High
TinyMCE is an open source rich text editor. A cross-site scripting (XSS)
vulnerability was discovered in TinyMCE’s content parsing code. This
allowed specially crafted noscript elements containing malicious code to be
executed when that content was loaded into the editor. This vulnerability
has been patched in TinyMCE 7.2.0, TinyMCE 6.8.4 and TinyMCE 5.11.0 LTS by
ensuring that content within noscript elements are properly parsed. Users
are advised to upgrade. There are no known workarounds for this
vulnerability.
Author | Note |
---|---|
rodrigo-zaiden | roundcube includes tinymce source |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | roundcube | < any | UNKNOWN |
ubuntu | 20.04 | noarch | roundcube | < any | UNKNOWN |
ubuntu | 22.04 | noarch | roundcube | < any | UNKNOWN |
ubuntu | 24.04 | noarch | roundcube | < any | UNKNOWN |
ubuntu | 16.04 | noarch | roundcube | < any | UNKNOWN |
ubuntu | 18.04 | noarch | tinymce | < any | UNKNOWN |
ubuntu | 20.04 | noarch | tinymce | < any | UNKNOWN |
ubuntu | 16.04 | noarch | tinymce | < any | UNKNOWN |
github.com/tinymce/tinymce/commit/5acb741665a98e83d62b91713c800abbff43b00d
github.com/tinymce/tinymce/security/advisories/GHSA-w9jx-4g6g-rp7x
launchpad.net/bugs/cve/CVE-2024-38357
nvd.nist.gov/vuln/detail/CVE-2024-38357
owasp.org/www-community/attacks/xss
security-tracker.debian.org/tracker/CVE-2024-38357
www.cve.org/CVERecord?id=CVE-2024-38357
www.tiny.cloud/docs/tinymce/6/6.8.4-release-notes/#overview
www.tiny.cloud/docs/tinymce/7/7.2-release-notes/#overview