org.webjars.npm:trix@2.1.15 vulnerabilities

  • latest version

    2.1.15

  • first published

    2 years ago

  • latest version published

    2 months ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.webjars.npm:trix package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Cross-site Scripting (XSS)

    org.webjars.npm:trix is a Rich Text Editor.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the copy and paste functionality. An attacker can execute arbitrary JavaScript code within the user's session by tricking a user into pasting malicious content. This could lead to unauthorized actions or disclosure of sensitive information.

    How to fix Cross-site Scripting (XSS)?

    A fix was pushed into the master branch but not yet published.

    [0,)
    • M
    Cross-site Scripting (XSS)

    org.webjars.npm:trix is a Rich Text Editor.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the ToolbarController class due to improper user input sanitization. An attacker can execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed by pasting a malicious javascript: URL.

    How to fix Cross-site Scripting (XSS)?

    A fix was pushed into the master branch but not yet published.

    [0,)
    • M
    Cross-site Scripting (XSS)

    org.webjars.npm:trix is a Rich Text Editor.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the pasting process due to improper input sanitization. An attacker can execute arbitrary JavaScript code within the user's session, potentially leading to unauthorized actions or sensitive information disclosure by tricking a user to copy and paste malicious code.

    Note:

    In addition to upgrading to the patched version, it is recommended to disallow browsers that don't support a Content Security Policy and setting CSP policies such as script-src 'self' to ensure that only scripts hosted on the same origin are executed, and explicitly prohibiting inline scripts using script-src-elem.

    How to fix Cross-site Scripting (XSS)?

    There is no fixed version for org.webjars.npm:trix.

    [0,)