2.1.15
2 years ago
2 months ago
Known vulnerabilities in the org.webjars.npm:trix package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.webjars.npm:trix is a Rich Text Editor. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the copy and paste functionality. An attacker can execute arbitrary JavaScript code within the user's session by tricking a user into pasting malicious content. This could lead to unauthorized actions or disclosure of sensitive information. How to fix Cross-site Scripting (XSS)? A fix was pushed into the | [0,) |
org.webjars.npm:trix is a Rich Text Editor. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the How to fix Cross-site Scripting (XSS)? A fix was pushed into the | [0,) |
org.webjars.npm:trix is a Rich Text Editor. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the pasting process due to improper input sanitization. An attacker can execute arbitrary JavaScript code within the user's session, potentially leading to unauthorized actions or sensitive information disclosure by tricking a user to copy and paste malicious code. Note: In addition to upgrading to the patched version, it is recommended to disallow browsers that don't support a Content Security Policy and setting CSP policies such as script-src 'self' to ensure that only scripts hosted on the same origin are executed, and explicitly prohibiting inline scripts using script-src-elem. How to fix Cross-site Scripting (XSS)? There is no fixed version for | [0,) |