CVE-2024-38356

MEDIUM

TinyMCE <7.2.0, <6.8.4, <5.11.0 - XSS

Title source: llm
STIX 2.1

Description

TinyMCE is an open source rich text editor. A cross-site scripting (XSS) vulnerability was discovered in TinyMCE’s content extraction code. When using the `noneditable_regexp` option, specially crafted HTML attributes containing malicious code were able to be executed when content was extracted from the editor. This vulnerability has been patched in TinyMCE 7.2.0, TinyMCE 6.8.4 and TinyMCE 5.11.0 LTS by ensuring that, when using the `noneditable_regexp` option, any content within an attribute is properly verified to match the configured regular expression before being added. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Scores

CVSS v3 6.1
EPSS 0.0074
EPSS Percentile 73.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-79
Status published
Products (7)
npm/tinymce 0 - 5.11.0npm
nuget/TinyMCE 0 - 5.11.0NuGet
pypi/django-tinymce 0 - 4.1.0PyPI
tinymce/tinymce 0 - 5.11.0Packagist
tinymce/tinymce < 5.11.0
tinymce/tinymce >= 6.0.0, <6.8.4
tinymce/tinymce >= 7.0.0, < 7.2.0
Published Jun 19, 2024
Tracked Since Feb 18, 2026