tinymce@6.1.2 vulnerabilities

Web based JavaScript HTML WYSIWYG editor control.

Direct Vulnerabilities

Known vulnerabilities in the tinymce package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-Site Scripting (XSS)

tinymce is a web-based JavaScript HTML WYSIWYG editor control.

Affected versions of this package are vulnerable to Cross-Site Scripting (XSS) via iframe elements inserted into the editor. Attacks are limited by same-origin browser protections, but downloading files is still possible.

How to fix Cross-Site Scripting (XSS)?

Upgrade tinymce to version 7.0.0 or higher.

<7.0.0
  • M
Cross-site Scripting (XSS)

tinymce is a web-based JavaScript HTML WYSIWYG editor control.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when loading SVG files via object or embed elements.

How to fix Cross-site Scripting (XSS)?

Upgrade tinymce to version 7.0.0 or higher.

<7.0.0
  • M
Cross-site Scripting (XSS)

tinymce is a web-based JavaScript HTML WYSIWYG editor control.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via mutation of inner HTML. An attacker can inject malicious scripts that pass the initial sanitization layer when the content is parsed into the editor body, but can trigger XSS when the special internal marker is removed from the content and re-parsed. Text nodes in some parents are not sufficiently escaped upon serialization and can contain a special character reserved as an internal marker.

How to fix Cross-site Scripting (XSS)?

Upgrade tinymce to version 5.10.9, 6.7.3 or higher.

<5.10.9 >=6.0.0 <6.7.3
  • M
Cross-site Scripting (XSS)

tinymce is a web-based JavaScript HTML WYSIWYG editor control.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the core undo and redo functionality. An attacker can exploit this vulnerability by passing a carefully-crafted HTML snippet that bypasses the sanitisation layer, is manipulated as a string by internal trimming functions, and is stored in the undo stack. If the HTML snippet is restored from the undo stack, the reparative parsing by either the browser's native DOMParser API (TinyMCE 6) or the SaxParser API (TinyMCE 5) mutates the HTML maliciously.

How to fix Cross-site Scripting (XSS)?

Upgrade tinymce to version 5.10.8, 6.7.1 or higher.

<5.10.8 >=6.0.0 <6.7.1
  • M
Cross-site Scripting (XSS)

tinymce is a web-based JavaScript HTML WYSIWYG editor control.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the Notification Manager API due to improper input sanitization. An attacker can execute arbitrary JavaScript when a notification is presented in the UI for the current user by inserting carefully crafted malicious content into the editor and triggering a notification.

How to fix Cross-site Scripting (XSS)?

Upgrade tinymce to version 5.10.8, 6.7.1 or higher.

<5.10.8 >=6.0.0 <6.7.1
  • M
Cross-site Scripting (XSS)

tinymce is a web-based JavaScript HTML WYSIWYG editor control.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization in the alert and confirm dialogs when these dialogs were provided with malicious HTML content. This can occur in plugins that use the alert or confirm dialogs, such as in the image plugin, which presents these dialogs when certain errors occur.

How to fix Cross-site Scripting (XSS)?

Upgrade tinymce to version 5.10.7, 6.3.1 or higher.

<5.10.7 >=6.0.0 <6.3.1