Skip to content

TinyMCE vulnerable to mutation Cross-site Scripting via special characters in unescaped text nodes

Moderate severity GitHub Reviewed Published Nov 15, 2023 in tinymce/tinymce • Updated Nov 15, 2023

Package

nuget TinyMCE (NuGet)

Affected versions

< 5.10.9
>= 6.0.0, < 6.7.3

Patched versions

5.10.9
6.7.3
npm tinymce (npm)
< 5.10.9
>= 6.0.0, < 6.7.3
5.10.9
6.7.3
composer tinymce/tinymce (Composer)
< 5.10.9
>= 6.0.0, < 6.7.3
5.10.9
6.7.3

Description

Impact

A mutation cross-site scripting (mXSS) vulnerability was discovered in TinyMCE’s core undo/redo functionality and other APIs and plugins. Text nodes within specific parents are not escaped upon serialization according to the HTML standard. If such text nodes contain a special character reserved as an internal marker, they can be combined with other HTML patterns to form malicious snippets. These snippets pass the initial sanitisation layer when the content is parsed into the editor body, but can trigger XSS when the special internal marker is removed from the content and re-parsed. Such mutations occur when serialised HTML content is processed before being stored in the undo stack, or when the following APIs and plugins are used:

Patches

This vulnerability has been patched in TinyMCE 6.7.3 by:

  • ensuring that any unescaped text nodes which contain the special internal marker are emptied before removing the marker from the rest of the HTML, and
  • removing the special internal marker from content strings passed to Editor.setContent, Editor.insertContent, and Editor.resetContent APIs to prevent them from being loaded into the editor as user-provided content.

Fix

To avoid this vulnerability:

  • Upgrade to TinyMCE 6.7.3 or higher for TinyMCE 6.x.
  • Upgrade to TinyMCE 5.10.9 or higher for TinyMCE 5.x.

Acknowledgements

Tiny Technologies would like to thank Masato Kinugawa of Cure53 for discovering this vulnerability.

References

For more information

Email us at infosec@tiny.cloud
Open an issue in the TinyMCE repo

References

@mkzhx mkzhx published to tinymce/tinymce Nov 15, 2023
Published to the GitHub Advisory Database Nov 15, 2023
Reviewed Nov 15, 2023
Published by the National Vulnerability Database Nov 15, 2023
Last updated Nov 15, 2023

Severity

Moderate

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS score

0.069%
(32nd percentile)

Weaknesses

CVE ID

CVE-2023-48219

GHSA ID

GHSA-v626-r774-j7f8

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.