trix@1.3.1 vulnerabilities

A rich text editor for everyday writing

Direct Vulnerabilities

Known vulnerabilities in the trix package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-site Scripting (XSS)

trix is a Rich Text Editor.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper input sanitization of the Attachment object, which derives from an improper fix of CVE-2024-34341. An attacker can trick a user into copying and pasting malicious code that will trigger the exploitation of the vulnerability.

How to fix Cross-site Scripting (XSS)?

Upgrade trix to version 2.1.4 or higher.

<2.1.4
  • M
Cross-site Scripting (XSS)

trix is a Rich Text Editor.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper sanitization of pasted content from external sources into the editor. An attacker can execute arbitrary JavaScript code within the context of the user's session by embedding malicious scripts in the copied content. This is only exploitable if the Content Security Policy (CSP) does not adequately restrict inline scripts and external sources.

How to fix Cross-site Scripting (XSS)?

Upgrade trix to version 1.3.2, 2.1.1 or higher.

>=0.9.0 <1.3.2 >=2.0.0 <2.1.1