Vulnerabilites related to basecamp - trix
CVE-2024-34341 (GCVE-0-2024-34341)
Vulnerability from cvelistv5
Published
2024-05-07 15:13
Modified
2024-08-02 02:51
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Trix is a rich text editor. The Trix editor, versions prior to 2.1.1, is vulnerable to arbitrary code execution when copying and pasting content from the web or other documents with markup into the editor. The vulnerability stems from improper sanitization of pasted content, allowing an attacker to embed malicious scripts which are executed within the context of the application. Users should upgrade to Trix editor version 2.1.1 or later, which incorporates proper sanitization of input from copied content.
Impacted products
Vendor Product Version
basecamp trix Version: < 2.1.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:basecamp:trix:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "trix",
            "vendor": "basecamp",
            "versions": [
              {
                "lessThan": "2.1.1",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-34341",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-07T18:19:32.684649Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:41:09.585Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T02:51:09.811Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/basecamp/trix/security/advisories/GHSA-qjqp-xr96-cj99",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/basecamp/trix/security/advisories/GHSA-qjqp-xr96-cj99"
          },
          {
            "name": "https://github.com/basecamp/trix/pull/1147",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/basecamp/trix/pull/1147"
          },
          {
            "name": "https://github.com/basecamp/trix/pull/1149",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/basecamp/trix/pull/1149"
          },
          {
            "name": "https://github.com/basecamp/trix/commit/1a5c68a14d48421fc368e30026f4a7918028b7ad",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/basecamp/trix/commit/1a5c68a14d48421fc368e30026f4a7918028b7ad"
          },
          {
            "name": "https://github.com/basecamp/trix/commit/841ff19b53f349915100bca8fcb488214ff93554",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/basecamp/trix/commit/841ff19b53f349915100bca8fcb488214ff93554"
          },
          {
            "name": "https://github.com/basecamp/trix/releases/tag/v2.1.1",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/basecamp/trix/releases/tag/v2.1.1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "trix",
          "vendor": "basecamp",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 2.1.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Trix is a rich text editor. The Trix editor, versions prior to 2.1.1, is vulnerable to arbitrary code execution when copying and pasting content from the web or other documents with markup into the editor. The vulnerability stems from improper sanitization of pasted content, allowing an attacker to embed malicious scripts which are executed within the context of the application. Users should upgrade to Trix editor version 2.1.1 or later, which incorporates proper sanitization of input from copied content."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-07T15:13:03.137Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/basecamp/trix/security/advisories/GHSA-qjqp-xr96-cj99",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/basecamp/trix/security/advisories/GHSA-qjqp-xr96-cj99"
        },
        {
          "name": "https://github.com/basecamp/trix/pull/1147",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/basecamp/trix/pull/1147"
        },
        {
          "name": "https://github.com/basecamp/trix/pull/1149",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/basecamp/trix/pull/1149"
        },
        {
          "name": "https://github.com/basecamp/trix/commit/1a5c68a14d48421fc368e30026f4a7918028b7ad",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/basecamp/trix/commit/1a5c68a14d48421fc368e30026f4a7918028b7ad"
        },
        {
          "name": "https://github.com/basecamp/trix/commit/841ff19b53f349915100bca8fcb488214ff93554",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/basecamp/trix/commit/841ff19b53f349915100bca8fcb488214ff93554"
        },
        {
          "name": "https://github.com/basecamp/trix/releases/tag/v2.1.1",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/basecamp/trix/releases/tag/v2.1.1"
        }
      ],
      "source": {
        "advisory": "GHSA-qjqp-xr96-cj99",
        "discovery": "UNKNOWN"
      },
      "title": "The Trix Editor Contains an Arbitrary Code Execution Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-34341",
    "datePublished": "2024-05-07T15:13:03.137Z",
    "dateReserved": "2024-05-02T06:36:32.436Z",
    "dateUpdated": "2024-08-02T02:51:09.811Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-43368 (GCVE-0-2024-43368)
Vulnerability from cvelistv5
Published
2024-08-14 21:12
Modified
2024-08-15 15:00
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
The Trix editor, versions prior to 2.1.4, is vulnerable to XSS when pasting malicious code. This vulnerability is a bypass of the fix put in place for GHSA-qjqp-xr96-cj99. In pull request 1149, sanitation was added for Trix attachments with a `text/html` content type. However, Trix only checks the content type on the paste event's `dataTransfer` object. As long as the `dataTransfer` has a content type of `text/html`, Trix parses its contents and creates an `Attachment` with them, even if the attachment itself doesn't have a `text/html` content type. Trix then uses the attachment content to set the attachment element's `innerHTML`. An attacker could trick a user to copy and paste malicious code that would execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed. This vulnerability was fixed in version 2.1.4.
Impacted products
Vendor Product Version
basecamp trix Version: < 2.1.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:basecamp:trix:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "trix",
            "vendor": "basecamp",
            "versions": [
              {
                "lessThan": "2.1.4",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-43368",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-15T14:58:19.809772Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-15T15:00:00.907Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "trix",
          "vendor": "basecamp",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 2.1.4"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Trix editor, versions prior to 2.1.4, is vulnerable to XSS when pasting malicious code. This vulnerability is a bypass of the fix put in place for GHSA-qjqp-xr96-cj99. In pull request 1149, sanitation was added for Trix attachments with a `text/html` content type. However, Trix only checks the content type on the paste event\u0027s `dataTransfer` object. As long as the `dataTransfer` has a content type of `text/html`, Trix parses its contents and creates an `Attachment` with them, even if the attachment itself doesn\u0027t have a `text/html` content type. Trix then uses the attachment content to set the attachment element\u0027s `innerHTML`. An attacker could trick a user to copy and paste malicious code that would execute arbitrary JavaScript code within the context of the user\u0027s session, potentially leading to unauthorized actions being performed or sensitive information being disclosed. This vulnerability was fixed in version 2.1.4."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-14T21:12:24.240Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/basecamp/trix/security/advisories/GHSA-qm2q-9f3q-2vcv",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/basecamp/trix/security/advisories/GHSA-qm2q-9f3q-2vcv"
        },
        {
          "name": "https://github.com/basecamp/trix/security/advisories/GHSA-qjqp-xr96-cj99",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/basecamp/trix/security/advisories/GHSA-qjqp-xr96-cj99"
        },
        {
          "name": "https://github.com/basecamp/trix/pull/1149",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/basecamp/trix/pull/1149"
        },
        {
          "name": "https://github.com/basecamp/trix/pull/1156",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/basecamp/trix/pull/1156"
        },
        {
          "name": "https://github.com/basecamp/trix/commit/7656f578af0d03141a72a9d27cb3692e6947dae6",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/basecamp/trix/commit/7656f578af0d03141a72a9d27cb3692e6947dae6"
        },
        {
          "name": "https://github.com/basecamp/trix/releases/tag/v2.1.4",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/basecamp/trix/releases/tag/v2.1.4"
        }
      ],
      "source": {
        "advisory": "GHSA-qm2q-9f3q-2vcv",
        "discovery": "UNKNOWN"
      },
      "title": "Trix has a Cross-Site Scripting (XSS) vulnerability on copy \u0026 paste"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-43368",
    "datePublished": "2024-08-14T21:12:24.240Z",
    "dateReserved": "2024-08-09T14:23:55.513Z",
    "dateUpdated": "2024-08-15T15:00:00.907Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-21610 (GCVE-0-2025-21610)
Vulnerability from cvelistv5
Published
2025-01-03 16:29
Modified
2025-01-03 16:56
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Trix is a what-you-see-is-what-you-get rich text editor for everyday writing. Versions prior to 2.1.12 are vulnerable to cross-site scripting when pasting malicious code in the link field. An attacker could trick the user to copy&paste a malicious `javascript:` URL as a link that would execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed. Users should upgrade to Trix editor version 2.1.12 or later to receive a patch. In addition to upgrading, affected users can disallow browsers that don't support a Content Security Policy (CSP) as a workaround for this and other cross-site scripting vulnerabilities. Set CSP policies such as script-src 'self' to ensure that only scripts hosted on the same origin are executed, and explicitly prohibit inline scripts using script-src-elem.
Impacted products
Vendor Product Version
basecamp trix Version: < 2.1.12
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-21610",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-03T16:55:29.669326Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-03T16:56:23.301Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "trix",
          "vendor": "basecamp",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 2.1.12"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Trix is a what-you-see-is-what-you-get rich text editor for everyday writing. Versions prior to 2.1.12 are vulnerable to cross-site scripting when pasting malicious code in the link field. An attacker could trick the user to copy\u0026paste a malicious `javascript:` URL as a link that would execute arbitrary JavaScript code within the context of the user\u0027s session, potentially leading to unauthorized actions being performed or sensitive information being disclosed. Users should upgrade to Trix editor version 2.1.12 or later to receive a patch. In addition to upgrading, affected users can disallow browsers that don\u0027t support a Content Security Policy (CSP) as a workaround for this and other cross-site scripting vulnerabilities. Set CSP policies such as script-src \u0027self\u0027 to ensure that only scripts hosted on the same origin are executed, and explicitly prohibit inline scripts using script-src-elem."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-03T16:29:54.939Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/basecamp/trix/security/advisories/GHSA-j386-3444-qgwg",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/basecamp/trix/security/advisories/GHSA-j386-3444-qgwg"
        },
        {
          "name": "https://github.com/basecamp/trix/commit/180c8d337f18e1569cea6ef29b4d03ffff5b5faa",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/basecamp/trix/commit/180c8d337f18e1569cea6ef29b4d03ffff5b5faa"
        },
        {
          "name": "https://github.com/basecamp/trix/commit/c4f0d6f80654603932af6685694f694e96593b93",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/basecamp/trix/commit/c4f0d6f80654603932af6685694f694e96593b93"
        },
        {
          "name": "https://gist.github.com/th4s1s/3921fd9c3e324ad9a3e0d846166e3eb8",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gist.github.com/th4s1s/3921fd9c3e324ad9a3e0d846166e3eb8"
        }
      ],
      "source": {
        "advisory": "GHSA-j386-3444-qgwg",
        "discovery": "UNKNOWN"
      },
      "title": "Trix allows Cross-site Scripting via `javascript:` url in a link"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2025-21610",
    "datePublished": "2025-01-03T16:29:54.939Z",
    "dateReserved": "2024-12-29T03:00:24.713Z",
    "dateUpdated": "2025-01-03T16:56:23.301Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-46812 (GCVE-0-2025-46812)
Vulnerability from cvelistv5
Published
2025-05-08 19:27
Modified
2025-05-08 20:00
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Trix is a what-you-see-is-what-you-get rich text editor for everyday writing. Versions prior to 2.1.15 are vulnerable to XSS attacks when pasting malicious code. An attacker could trick a user to copy and paste malicious code that would execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed. This issue has been patched in version 2.1.15.
Impacted products
Vendor Product Version
basecamp trix Version: < 2.1.15
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-46812",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-08T19:58:29.593312Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-08T20:00:42.604Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "trix",
          "vendor": "basecamp",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 2.1.15"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Trix is a what-you-see-is-what-you-get rich text editor for everyday writing. Versions prior to 2.1.15 are vulnerable to XSS attacks when pasting malicious code. An attacker could trick a user to copy and paste malicious code that would execute arbitrary JavaScript code within the context of the user\u0027s session, potentially leading to unauthorized actions being performed or sensitive information being disclosed. This issue has been patched in version 2.1.15."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 2,
            "baseSeverity": "LOW",
            "privilegesRequired": "NONE",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "LOW",
            "subIntegrityImpact": "LOW",
            "userInteraction": "ACTIVE",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-08T19:27:22.573Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/basecamp/trix/security/advisories/GHSA-mcrw-746g-9q8h",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/basecamp/trix/security/advisories/GHSA-mcrw-746g-9q8h"
        },
        {
          "name": "https://github.com/basecamp/trix/commit/75226089646841b0f774d8b152e5ec27d2d9e191",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/basecamp/trix/commit/75226089646841b0f774d8b152e5ec27d2d9e191"
        }
      ],
      "source": {
        "advisory": "GHSA-mcrw-746g-9q8h",
        "discovery": "UNKNOWN"
      },
      "title": "Trix vulnerable to Cross-site Scripting on copy \u0026 paste"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2025-46812",
    "datePublished": "2025-05-08T19:27:22.573Z",
    "dateReserved": "2025-04-30T19:41:58.133Z",
    "dateUpdated": "2025-05-08T20:00:42.604Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-53847 (GCVE-0-2024-53847)
Vulnerability from cvelistv5
Published
2024-12-09 18:49
Modified
2024-12-10 16:15
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
The Trix rich text editor, prior to versions 2.1.9 and 1.3.3, is vulnerable to cross-site scripting (XSS) + mutation XSS attacks when pasting malicious code. An attacker could trick a user to copy and paste malicious code that would execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed. Users should upgrade to Trix editor version 2.1.9 or 1.3.3, which uses DOMPurify to sanitize the pasted content.
Impacted products
Vendor Product Version
basecamp trix Version: >= 2.0.0, < 2.1.9
Version: >= 1.0.0, < 1.3.3
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-53847",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-10T16:15:17.901273Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-10T16:15:40.972Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "trix",
          "vendor": "basecamp",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 2.0.0, \u003c 2.1.9"
            },
            {
              "status": "affected",
              "version": "\u003e= 1.0.0, \u003c 1.3.3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Trix rich text editor, prior to versions 2.1.9 and 1.3.3, is vulnerable to cross-site scripting (XSS) + mutation XSS attacks when pasting malicious code. An attacker could trick a user to copy and paste malicious code that would execute arbitrary JavaScript code within the context of the user\u0027s session, potentially leading to unauthorized actions being performed or sensitive information being disclosed. Users should upgrade to Trix editor version 2.1.9 or 1.3.3, which uses DOMPurify to sanitize the pasted content."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "NONE",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "LOW",
            "subIntegrityImpact": "LOW",
            "userInteraction": "ACTIVE",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-09T18:49:37.339Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/basecamp/trix/security/advisories/GHSA-6vx4-v2jw-qwqh",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/basecamp/trix/security/advisories/GHSA-6vx4-v2jw-qwqh"
        },
        {
          "name": "https://github.com/basecamp/trix/commit/272c7e27e722608732a67108ad3fe7870e233ac8",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/basecamp/trix/commit/272c7e27e722608732a67108ad3fe7870e233ac8"
        }
      ],
      "source": {
        "advisory": "GHSA-6vx4-v2jw-qwqh",
        "discovery": "UNKNOWN"
      },
      "title": "Trix vulnerable to Cross-site Scripting on copy \u0026 paste"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-53847",
    "datePublished": "2024-12-09T18:49:37.339Z",
    "dateReserved": "2024-11-22T17:30:02.140Z",
    "dateUpdated": "2024-12-10T16:15:40.972Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}