Description
The Trix editor, versions prior to 2.1.4, is vulnerable to XSS when pasting malicious code. This vulnerability is a bypass of the fix put in place for https://github.com/basecamp/trix/security/advisories/GHSA-qjqp-xr96-cj99. In https://github.com/basecamp/trix/pull/1149, we added sanitation for Trix attachments with a text/html content type.
Recommendation
Update the trix package to the latest compatible version. Followings are version details:
- Affected version(s): < 2.1.4
- Patched version(s): 2.1.4
References
Related Issues
- XSS in the `of` option of the `.position()` util in jquery-ui - CVE-2021-41184
- NextJS-Auth0 SDK Vulnerable to CDN Caching of Session Cookies - CVE-2025-48947
- Strapi allows Server-Side Request Forgery in Webhook function - CVE-2024-52588
- Trix vulnerable to Cross-site Scripting on copy & paste - CVE-2025-46812
- Tags:
- npm
- trix
Anything's wrong? Let us know Last updated on August 15, 2024