Viewing 12 replies - 1 through 12 (of 12 total)
  • I second this – no updates for over a year!? This plugin with no support answers, a living corpse? Ready to be deinstalled?

    Thread Starter praveenelevon

    (@praveenelevon)

    Hi we want to know why WordPress has not removed this plugin from it’s core package. And if there is any work around provided by WordPress so that this vulnerability in WordPress gets fixed.

    As already mentioned wordpress core package has a file in this directory with version 4.9 path  wp-includes/js/tinymce/tinymce.min.js?ver=49110-20201110

    Hi, the file mentioned is present also if you unistall the plugin.
    Are you sure there is a real vulnerability and this one is from this plugin?

    Also your vendor link in the first post is broken.

    I created a report to the WordPress Core by HackerOne someone will look at this.

    Thread Starter praveenelevon

    (@praveenelevon)

    Thanks can I get HackerOne  ticket URL to monitor

    @praveenelevon

    You may find interesting reading this topic:
    https://core.trac.wordpress.org/ticket/47218

    Plugin Author Andrew Ozz

    (@azaozz)

    Hi @praveenelevon, @peopleinside were you able to reproduce this vulnerability?

    the file mentioned is present also if you unistall the plugin

    Right, TinyMCE is part of WordPress, not this plugin.

    You may find interesting reading this topic

    Yea, seems this has been reported and discussed on Trac.

    Thread Starter praveenelevon

    (@praveenelevon)

    Hi Andrew,

    We have done vulnerability scanning of site and got that this file with older Tiny Mce version exists in WordPress core file I have mentioned the path of the file, So they suggest to update to latest version as old version have vulnerability issue, Is WordPress Team planning to update this file or remove it if not required that’s what we need to know:

    As already mentioned wordpress core package has a file in this directory with version 4.9 path  wp-includes/js/tinymce/tinymce.min.js?ver=49110-20201110

    Plugin Author Andrew Ozz

    (@azaozz)

    @praveenelevon I understand your concern. However it seems the vulnerabilities being reported may not affect old versions of TinyMCE like version 4.9.11 that is currently used in WordPress. Please see https://core.trac.wordpress.org/ticket/47218#comment:34.

    Would it be possible to confirm the vulnerability scan result? For example a CVE number like in the above linked comment would be nice.

    Thread Starter praveenelevon

    (@praveenelevon)

    Hi @azaozz , we get CVE-2024-29881 , CVE-2024-29203. Scan result as follows:

    Vulnerable javascript library: TinyMCE
    version: 4.9.11
    script uri: https://lmsuat.tradeday.com/wp-includes/js/tinymce/tinymce.min.js?ver=49110-20201110
    Details:
    TinyMCE 5.1.6 provides improvement in CDATA parsing and sanitization to address a cross-site scripting (XSS) vulnerability. Please refer to vendor documentation (https://www.tiny.cloud/docs/ release-notes/release-notes516/) for more information.

    TinyMCE 5.2.2 provides fix for media embed content not processing safely in some cases. Please refer to vendor documentation (https://www.tiny.cloud/docs/release-notes/release-notes522/) for more information.

    TinyMCE 5.4 Fixed content in an iframe element parsing as DOM elements instead of text content. Please refer to vendor documentation (https://www.tiny.cloud/docs/release-notes/release-notes54/) for more information.

    CVE-2024-29203: A Cross-Site Scripting (XSS) Vulnerability exists in TinyMCE’s content insertion code. This allows ‘iframe’ elements containing malicious code to execute when inserted into the
    editor. These ‘iframe’ elements are restricted in their permissions by same-origin browser protections, but could still trigger operations such as downloading of malicious assets.
    Solution: Upgrade TinyMCE to version 7.0.0 or later. For more information pertaining to this vulnerability, please refer TinyMCE Security Advisory (https://github.com/tinymce/tinymce/security/ advisories/GHSA-438c-3975-5x3f).

    CVE-2024-29881: A Cross-Site Scripting (XSS) Vulnerability exists in TinyMCE’s content loading and content insertion code. This vulnerability allows for the loading of an SVG image though an
    ‘object’ or ’embed’ element, which could potentially contain an XSS payload.
    Solution: Upgrade TinyMCE to version 7.0.0 or later. For more information pertaining to this vulnerability, please refer TinyMCE Security Advisory (https://github.com/tinymce/tinymce/security/
    advisories/GHSA-5359-pvf2-pw78).

    Thread Starter praveenelevon

    (@praveenelevon)

    Hi @azaozz ,

    Any update on this? Is it secure?

Viewing 12 replies - 1 through 12 (of 12 total)

The topic ‘Tiny MCE Vulnerablity’ is closed to new replies.