Skip to content

Commit 7caa1bf

Browse files
committed
GHSA/SYNC: 1 brand new advisory
1 parent ca57f1c commit 7caa1bf

File tree

1 file changed

+38
-0
lines changed

1 file changed

+38
-0
lines changed
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
gem: action_text-trix
3+
ghsa: qmpg-8xg6-ph5q
4+
url: https://github.com/basecamp/trix/security/advisories/GHSA-qmpg-8xg6-ph5q
5+
title: Trix has a Stored XSS vulnerability through serialized attributes
6+
date: 2026-03-12
7+
description: |
8+
### Impact
9+
10+
The Trix editor, in versions prior to 2.1.17, is vulnerable to XSS
11+
attacks when a `data-trix-serialized-attributes` attribute bypasses
12+
the DOMPurify sanitizer.
13+
14+
An attacker could craft HTML containing a `data-trix-serialized-attributes`
15+
attribute with a malicious payload that, when the content is rendered,
16+
could execute arbitrary JavaScript code within the context of the user's
17+
session, potentially leading to unauthorized actions being performed
18+
or sensitive information being disclosed.
19+
20+
### Patches
21+
22+
Update Recommendation: Users should upgrade to Trix editor
23+
version 2.1.17 or later.
24+
25+
### References
26+
27+
The XSS vulnerability was responsibly reported by Hackerone
28+
researcher [newbiefromcoma](https://hackerone.com/newbiefromcoma).
29+
cvss_v3: 4.6
30+
patched_versions:
31+
- ">= 2.1.17"
32+
related:
33+
url:
34+
- https://github.com/basecamp/trix/security/advisories/GHSA-qmpg-8xg6-ph5q
35+
- https://github.com/basecamp/trix/releases/tag/v2.1.17
36+
- https://github.com/basecamp/trix/pull/1282
37+
- https://github.com/basecamp/trix/commit/53197ab5a142e6b0b76127cb790726b274eaf1bc
38+
- https://github.com/advisories/GHSA-qmpg-8xg6-ph5q

0 commit comments

Comments
 (0)