Skip to content

Commit 71e7b22

Browse files
jasnowRubySec CI
authored andcommitted
Updated advisory posts against rubysec/ruby-advisory-db@2235b2d
1 parent fb82607 commit 71e7b22

File tree

1 file changed

+44
-0
lines changed

1 file changed

+44
-0
lines changed
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
---
2+
layout: advisory
3+
title: 'GHSA-g9jg-w8vm-g96v (action_text-trix): Trix has a stored XSS vulnerability
4+
through its attachment attribute'
5+
comments: false
6+
categories:
7+
- action_text-trix
8+
advisory:
9+
gem: action_text-trix
10+
ghsa: g9jg-w8vm-g96v
11+
url: https://github.com/basecamp/trix/security/advisories/GHSA-g9jg-w8vm-g96v
12+
title: Trix has a stored XSS vulnerability through its attachment attribute
13+
date: 2025-12-31
14+
description: |
15+
### Impact
16+
17+
The Trix editor, in versions prior to 2.1.16, is vulnerable to XSS
18+
attacks through attachment payloads.
19+
20+
An attacker could inject malicious code into a data-trix-attachment
21+
attribute that, when rendered as HTML and clicked on, could execute
22+
arbitrary JavaScript code within the context of the user's session,
23+
potentially leading to unauthorized actions being performed or
24+
sensitive information being disclosed.
25+
26+
### Patches
27+
28+
Update Recommendation: Users should upgrade to Trix editor
29+
version 2.1.16 or later.
30+
31+
### Resources
32+
33+
The XSS vulnerability was reported by HackerOne researcher
34+
[michaelcheers](https://hackerone.com/michaelcheers?type=user).
35+
cvss_v3: 4.6
36+
patched_versions:
37+
- ">= 2.1.16"
38+
related:
39+
url:
40+
- https://github.com/basecamp/trix/security/advisories/GHSA-g9jg-w8vm-g96v
41+
- https://github.com/basecamp/trix/releases/tag/v2.1.16
42+
- https://github.com/basecamp/trix/commit/73c20cf03ab2b56c0ef9c9b1aaf63f2de44f4010
43+
- https://github.com/advisories/GHSA-g9jg-w8vm-g96v
44+
---

0 commit comments

Comments
 (0)