CVE-2024-29203:
TinyMCE Cross-Site Scripting (XSS) vulnerability in handling iframes
4.3
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
3/26/2024
Updated
3/26/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
tinymce | npm | < 6.8.1 | 6.8.1 |
TinyMCE | nuget | < 6.8.1 | 6.8.1 |
tinymce/tinymce | composer | < 6.8.1 | 6.8.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper sanitization of iframe elements during content insertion. Key indicators are:
- The commit adds new sandbox_iframes handling in ParserFilters.ts, indicating previous absence of this protection
- Test cases show unpatched versions didn't add sandbox attributes to iframes
- The patch introduces node filters that explicitly add sandbox attributes, implying prior vulnerability in these processing paths
- Paste handling was modified to include sandbox_iframes checks, showing pasted content was previously vulnerable These functions directly handle content parsing and insertion without the security measures introduced in the fix.