Description
The Trix editor, versions prior to 2.1.4, is vulnerable to XSS when pasting malicious code. This vulnerability is a bypass of the fix put in place for https://github.com/basecamp/trix/security/advisories/GHSA-qjqp-xr96-cj99. In https://github.com/basecamp/trix/pull/1149, we added sanitation for Trix attachments with a text/html
content type.
Recommendation
Update the trix
package to the latest compatible version. Followings are version details:
- Affected version(s): < 2.1.4
- Patched version(s): 2.1.4
References
Related Issues
- The AuthKit Remix Library renders sensitive auth data in HTML - CVE-2025-55009
- Strapi allows Server-Side Request Forgery in Webhook function - CVE-2024-52588
- Trix vulnerable to Cross-site Scripting on copy & paste - CVE-2025-46812
- Redoc Prototype Pollution via `Module.mergeObjects` Component - CVE-2024-57083
- Tags:
- npm
- trix
Anything's wrong? Let us know Last updated on August 15, 2024