Trix is a rich text editor. The Trix editor, versions prior to 2.1.1, is vulnerable to arbitrary code execution when copying and pasting content from the web or other documents with markup into the editor. The vulnerability stems from improper sanitization of pasted content, allowing an attacker to embed malicious scripts which are executed within the context of the application. Users should upgrade to Trix editor version 2.1.1 or later, which incorporates proper sanitization of input from copied content.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-05-07T15:13:03.137Z
Updated: 2024-08-02T02:51:09.811Z
Reserved: 2024-05-02T06:36:32.436Z
Link: CVE-2024-34341

Updated: 2024-08-02T02:51:09.811Z

Status : Awaiting Analysis
Published: 2024-05-07T16:15:08.217
Modified: 2024-11-21T09:18:27.890
Link: CVE-2024-34341

No data.