Trix is a rich text editor. The Trix editor, versions prior to 2.1.1, is vulnerable to arbitrary code execution when copying and pasting content from the web or other documents with markup into the editor. The vulnerability stems from improper sanitization of pasted content, allowing an attacker to embed malicious scripts which are executed within the context of the application. Users should upgrade to Trix editor version 2.1.1 or later, which incorporates proper sanitization of input from copied content.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1747 | Trix is a rich text editor. The Trix editor, versions prior to 2.1.1, is vulnerable to arbitrary code execution when copying and pasting content from the web or other documents with markup into the editor. The vulnerability stems from improper sanitization of pasted content, allowing an attacker to embed malicious scripts which are executed within the context of the application. Users should upgrade to Trix editor version 2.1.1 or later, which incorporates proper sanitization of input from copied content. |
Github GHSA |
GHSA-qjqp-xr96-cj99 | Trix Editor Arbitrary Code Execution Vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T02:51:09.811Z
Reserved: 2024-05-02T06:36:32.436Z
Link: CVE-2024-34341
Updated: 2024-08-02T02:51:09.811Z
Status : Awaiting Analysis
Published: 2024-05-07T16:15:08.217
Modified: 2024-11-21T09:18:27.890
Link: CVE-2024-34341
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:32:02Z
EUVD
Github GHSA