First published: Thu May 08 2025(Updated: )
### Impact The Trix editor, in versions prior to 2.1.15, is vulnerable to XSS attacks when pasting malicious code. An attacker could trick a user to copy and paste malicious code that would execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed. ### Patches Update Recommendation: Users should upgrade to Trix editor version 2.1.15 or later. ### References The XSS vulnerability was reported by HackerOne researcher [hiumee](https://hackerone.com/hiumee?type=user).
Affected Software | Affected Version | How to fix |
---|---|---|
npm/trix | <2.1.15 | 2.1.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
GHSA-mcrw-746g-9q8h is classified as a high severity vulnerability due to its potential for XSS attacks.
To resolve GHSA-mcrw-746g-9q8h, upgrade the Trix editor to version 2.1.15 or later.
GHSA-mcrw-746g-9q8h facilitates cross-site scripting (XSS) attacks when a user pastes malicious code.
Users of the Trix editor versions prior to 2.1.15 are affected by GHSA-mcrw-746g-9q8h.
If GHSA-mcrw-746g-9q8h is not addressed, an attacker could execute arbitrary JavaScript code in the user's session, leading to potential unauthorized actions.