Home

Description

Trix is a what-you-see-is-what-you-get rich text editor for everyday writing. Versions prior to 2.1.15 are vulnerable to XSS attacks when pasting malicious code. An attacker could trick a user to copy and paste malicious code that would execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed. This issue has been patched in version 2.1.15.

PUBLISHED Reserved 2025-04-30 | Published 2025-05-08 | Updated 2025-05-08 | Assigner GitHub_M




LOW: 2.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 2.1.15
affected

References

github.com/...p/trix/security/advisories/GHSA-mcrw-746g-9q8h

github.com/...ommit/75226089646841b0f774d8b152e5ec27d2d9e191

cve.org (CVE-2025-46812)

nvd.nist.gov (CVE-2025-46812)

Download JSON