You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
TinyMCE is an open source rich text editor. A cross-site scripting (XSS) vulnerability was discovered in TinyMCE’s content parsing code. This allowed specially crafted noscript elements containing malicious code to be executed when that content was loaded into the editor. This vulnerability has been patched in TinyMCE 7.2.0, TinyMCE 6.8.4 and TinyMCE 5.11.0 LTS by ensuring that content within noscript elements are properly parsed. Users are advised to upgrade. There are no known workarounds for this vulnerability.
TinyMCE is an open source rich text editor. A cross-site scripting (XSS) vulnerability was discovered in TinyMCE’s content extraction code. When using the noneditable_regexp option, specially crafted HTML attributes containing malicious code were able to be executed when content was extracted from the editor. This vulnerability has been patched in TinyMCE 7.2.0, TinyMCE 6.8.4 and TinyMCE 5.11.0 LTS by ensuring that, when using the noneditable_regexp option, any content within an attribute is properly verified to match the configured regular expression before being added. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Vulnerable Library - tinymce-6.8.2.tgz
Library home page: https://registry.npmjs.org/tinymce/-/tinymce-6.8.2.tgz
Path to dependency file: /src/Umbraco.Web.UI.Client/package.json
Path to vulnerable library: /src/Umbraco.Web.UI.Client/node_modules/tinymce/package.json
Found in HEAD commit: 43ec4e056c7bb2205bce58481105df392ede9c18
Vulnerabilities
Unreachable
Unreachable
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-38357
Vulnerable Library - tinymce-6.8.2.tgz
Library home page: https://registry.npmjs.org/tinymce/-/tinymce-6.8.2.tgz
Path to dependency file: /src/Umbraco.Web.UI.Client/package.json
Path to vulnerable library: /src/Umbraco.Web.UI.Client/node_modules/tinymce/package.json
Dependency Hierarchy:
Found in HEAD commit: 43ec4e056c7bb2205bce58481105df392ede9c18
Found in base branch: contrib
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
TinyMCE is an open source rich text editor. A cross-site scripting (XSS) vulnerability was discovered in TinyMCE’s content parsing code. This allowed specially crafted noscript elements containing malicious code to be executed when that content was loaded into the editor. This vulnerability has been patched in TinyMCE 7.2.0, TinyMCE 6.8.4 and TinyMCE 5.11.0 LTS by ensuring that content within noscript elements are properly parsed. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Publish Date: 2024-06-19
URL: CVE-2024-38357
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.0%
CVSS 4 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2024-38357
Release Date: 2024-06-19
Fix Resolution: 6.8.4
In order to enable automatic remediation, please create workflow rules
CVE-2024-38356
Vulnerable Library - tinymce-6.8.2.tgz
Library home page: https://registry.npmjs.org/tinymce/-/tinymce-6.8.2.tgz
Path to dependency file: /src/Umbraco.Web.UI.Client/package.json
Path to vulnerable library: /src/Umbraco.Web.UI.Client/node_modules/tinymce/package.json
Dependency Hierarchy:
Found in HEAD commit: 43ec4e056c7bb2205bce58481105df392ede9c18
Found in base branch: contrib
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
TinyMCE is an open source rich text editor. A cross-site scripting (XSS) vulnerability was discovered in TinyMCE’s content extraction code. When using the
noneditable_regexp
option, specially crafted HTML attributes containing malicious code were able to be executed when content was extracted from the editor. This vulnerability has been patched in TinyMCE 7.2.0, TinyMCE 6.8.4 and TinyMCE 5.11.0 LTS by ensuring that, when using thenoneditable_regexp
option, any content within an attribute is properly verified to match the configured regular expression before being added. Users are advised to upgrade. There are no known workarounds for this vulnerability.Publish Date: 2024-06-19
URL: CVE-2024-38356
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.0%
CVSS 4 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2024-38357
Release Date: 2024-06-19
Fix Resolution: 6.8.4
In order to enable automatic remediation, please create workflow rules
In order to enable automatic remediation for this issue, please create workflow rules
The text was updated successfully, but these errors were encountered: