trix@0.12.1 vulnerabilities

A rich text editor for everyday writing

Direct Vulnerabilities

Known vulnerabilities in the trix package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-site Scripting (XSS)

trix is a Rich Text Editor.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper sanitization of pasted content from external sources into the editor. An attacker can execute arbitrary JavaScript code within the context of the user's session by embedding malicious scripts in the copied content. This is only exploitable if the Content Security Policy (CSP) does not adequately restrict inline scripts and external sources.

How to fix Cross-site Scripting (XSS)?

Upgrade trix to version 2.1.1 or higher.

<2.1.1
  • L
Cross-site Scripting (XSS)

trix is a Rich Text Editor.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The javascript protocol URIs are not removed during the sanitizing of href values.

How to fix Cross-site Scripting (XSS)?

Upgrade trix to version 1.2.3 or higher.

<1.2.3
  • M
Cross-site Scripting (XSS)

trix is a Rich Text Editor.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It was possible to execute JavaScript on Trix Editor by pasting specially crafted HTML.

How to fix Cross-site Scripting (XSS)?

Upgrade trix to version 1.2.2 or higher.

<1.2.2