
CVE-2025-21610 – Trix allows Cross-site Scripting via `javascript:` url in a link
https://notcve.org/view.php?id=CVE-2025-21610
03 Jan 2025 — Trix is a what-you-see-is-what-you-get rich text editor for everyday writing. Versions prior to 2.1.12 are vulnerable to cross-site scripting when pasting malicious code in the link field. An attacker could trick the user to copy&paste a malicious `javascript:` URL as a link that would execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed. Users should upgrade to Trix editor version 2.1... • https://gist.github.com/th4s1s/3921fd9c3e324ad9a3e0d846166e3eb8 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-53847 – Trix vulnerable to Cross-site Scripting on copy & paste
https://notcve.org/view.php?id=CVE-2024-53847
09 Dec 2024 — The Trix rich text editor, prior to versions 2.1.9 and 1.3.3, is vulnerable to cross-site scripting (XSS) + mutation XSS attacks when pasting malicious code. An attacker could trick a user to copy and paste malicious code that would execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed. Users should upgrade to Trix editor version 2.1.9 or 1.3.3, which uses DOMPurify to sanitize the past... • https://github.com/basecamp/trix/commit/272c7e27e722608732a67108ad3fe7870e233ac8 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-43368 – Trix has a Cross-Site Scripting (XSS) vulnerability on copy & paste
https://notcve.org/view.php?id=CVE-2024-43368
14 Aug 2024 — The Trix editor, versions prior to 2.1.4, is vulnerable to XSS when pasting malicious code. This vulnerability is a bypass of the fix put in place for GHSA-qjqp-xr96-cj99. In pull request 1149, sanitation was added for Trix attachments with a `text/html` content type. However, Trix only checks the content type on the paste event's `dataTransfer` object. As long as the `dataTransfer` has a content type of `text/html`, Trix parses its contents and creates an `Attachment` with them, even if the attachment itse... • https://github.com/basecamp/trix/commit/7656f578af0d03141a72a9d27cb3692e6947dae6 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-34341 – The Trix Editor Contains an Arbitrary Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-34341
07 May 2024 — Trix is a rich text editor. The Trix editor, versions prior to 2.1.1, is vulnerable to arbitrary code execution when copying and pasting content from the web or other documents with markup into the editor. The vulnerability stems from improper sanitization of pasted content, allowing an attacker to embed malicious scripts which are executed within the context of the application. Users should upgrade to Trix editor version 2.1.1 or later, which incorporates proper sanitization of input from copied content. T... • https://github.com/basecamp/trix/commit/1a5c68a14d48421fc368e30026f4a7918028b7ad • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •