// For flags

CVE-2022-23494

Cross-site scripting vulnerability in TinyMCE alerts

Severity Score

6.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

tinymce is an open source rich text editor. A cross-site scripting (XSS) vulnerability was discovered in the alert and confirm dialogs when these dialogs were provided with malicious HTML content. This can occur in plugins that use the alert or confirm dialogs, such as in the `image` plugin, which presents these dialogs when certain errors occur. The vulnerability allowed arbitrary JavaScript execution when an alert presented in the TinyMCE UI for the current user. This vulnerability has been patched in TinyMCE 5.10.7 and TinyMCE 6.3.1 by ensuring HTML sanitization was still performed after unwrapping invalid elements. Users are advised to upgrade to either 5.10.7 or 6.3.1. Users unable to upgrade may ensure the the `images_upload_handler` returns a valid value as per the images_upload_handler documentation.

tinymce es un editor de texto enriquecido de código abierto. Se descubrió una vulnerabilidad de Cross-Site Scripting (XSS) en los cuadros de diálogo de alerta y confirmación cuando estos cuadros de diálogo contenían contenido HTML malicioso. Esto puede ocurrir en complementos que utilizan cuadros de diálogo de alerta o confirmación, como en el complemento "image", que presenta estos cuadros de diálogo cuando ocurren ciertos errores. La vulnerabilidad permitía la ejecución arbitraria de JavaScript cuando se presentaba una alerta en la interfaz de usuario de TinyMCE para el usuario actual. Esta vulnerabilidad se parchó en TinyMCE 5.10.7 y TinyMCE 6.3.1 asegurando que aún se realizara la sanitización de HTML después de desempaquetar elementos no válidos. Se recomienda a los usuarios que actualicen a 5.10.7 o 6.3.1. Los usuarios que no puedan actualizar pueden asegurarse de que `images_upload_handler` devuelva un valor válido según la documentación de images_upload_handler.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-01-19 CVE Reserved
  • 2022-12-08 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-08-27 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Tiny
Search vendor "Tiny"
Tinymce
Search vendor "Tiny" for product "Tinymce"
< 5.10.7
Search vendor "Tiny" for product "Tinymce" and version " < 5.10.7"
-
Affected
Tiny
Search vendor "Tiny"
Tinymce
Search vendor "Tiny" for product "Tinymce"
>= 6.0.0 < 6.3.1
Search vendor "Tiny" for product "Tinymce" and version " >= 6.0.0 < 6.3.1"
-
Affected