CVE-2025-46812

Trix is a what-you-see-is-what-you-get rich text editor for everyday writing. Versions prior to 2.1.15 are vulnerable to XSS attacks when pasting malicious code. An attacker could trick a user to copy and paste malicious code that would execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed. This issue has been patched in version 2.1.15.
CVSS

No CVSS.

Configurations

No configuration.

History

12 May 2025, 17:32

Type Values Removed Values Added
Summary
  • (es) Trix es un editor de texto enriquecido con una interfaz intuitiva para la escritura diaria. Las versiones anteriores a la 2.1.15 son vulnerables a ataques XSS al pegar código malicioso. Un atacante podría engañar a un usuario para que copie y pegue código malicioso que ejecutaría código JavaScript arbitrario en su sesión, lo que podría provocar acciones no autorizadas o la divulgación de información confidencial. Este problema se ha corregido en la versión 2.1.15.

08 May 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-08 20:15

Updated : 2025-05-12 17:32


NVD link : CVE-2025-46812

Mitre link : CVE-2025-46812

CVE.ORG link : CVE-2025-46812


JSON object : View

Products Affected

No product.

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')