{"url":"http://public2.vulnerablecode.io/api/packages/738298?format=json","purl":"pkg:npm/trix@1.3.5","type":"npm","namespace":"","name":"trix","version":"1.3.5","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"2.1.18","latest_non_vulnerable_version":"2.1.18","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/23929?format=json","vulnerability_id":"VCID-63mn-56k4-jbh4","summary":"Trix is vulnerable to XSS through JSON deserialization bypass in drag-and-drop (Level0InputController)\n### Impact\n\nThe Trix editor, in versions prior to 2.1.18, is vulnerable to XSS when a crafted `application/x-trix-document` JSON payload is dropped into the editor in environments using the fallback Level0InputController (e.g., embedded WebViews lacking Input Events Level 2 support).\n\nThe `StringPiece.fromJSON` method trusted `href` attributes from the JSON payload without sanitization. An attacker could craft a draggable element containing a `javascript:` URI in the href attribute that, when dropped into a vulnerable editor, would bypass DOMPurify sanitization and inject executable JavaScript into the DOM.\n\nExploitation requires a specific environment (Level0InputController fallback) and social engineering (victim must drag and drop attacker-controlled content into the editor). Applications using server-side HTML sanitization (such as Rails' built-in sanitizer) are additionally protected, as the payload is neutralized on save.\n\n### Patches\n\nUpdate Recommendation: Users should upgrade to Trix editor version 2.1.18 or later.\n\n\n### References\n\nThe XSS vulnerability was responsibly reported by Hackerone researcher [newbiefromcoma](https://hackerone.com/newbiefromcoma).","references":[{"reference_url":"https://github.com/basecamp/trix","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"},{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/basecamp/trix"},{"reference_url":"https://github.com/basecamp/trix/commit/9c0a993d9fc2ffe9d56b013b030bc238f9c0557c","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"},{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/basecamp/trix/commit/9c0a993d9fc2ffe9d56b013b030bc238f9c0557c"},{"reference_url":"https://github.com/basecamp/trix/releases/tag/v2.1.18","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"},{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/basecamp/trix/releases/tag/v2.1.18"},{"reference_url":"https://github.com/basecamp/trix/security/advisories/GHSA-53p3-c7vp-4mcc","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"2.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"},{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/basecamp/trix/security/advisories/GHSA-53p3-c7vp-4mcc"},{"reference_url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/action_text-trix/GHSA-53p3-c7vp-4mcc.yml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"},{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/action_text-trix/GHSA-53p3-c7vp-4mcc.yml"},{"reference_url":"https://github.com/advisories/GHSA-53p3-c7vp-4mcc","reference_id":"GHSA-53p3-c7vp-4mcc","reference_type":"","scores":[{"value":"LOW","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-53p3-c7vp-4mcc"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/66981?format=json","purl":"pkg:npm/trix@2.1.18","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/trix@2.1.18"}],"aliases":["GHSA-53p3-c7vp-4mcc"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-63mn-56k4-jbh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/25836?format=json","vulnerability_id":"VCID-7qg1-2vaz-aqdu","summary":"Trix allows Cross-site Scripting via `javascript:` url in a link\nThe Trix editor, versions prior to 2.1.11, is vulnerable to XSS when pasting malicious code in the link field.\n\n### Impact\n\nAn attacker could trick the user to copy&paste a malicious `javascript:` URL as a link that would execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed.\n\nSee https://gist.github.com/th4s1s/3921fd9c3e324ad9a3e0d846166e3eb8\n\n### Patches\n\nUpdate Recommendation: Users should upgrade to Trix editor version 2.1.12 or later.\n\n### Workarounds\n\nThis is not really a workaround but something that should be considered in addition to upgrading to the patched version. If affected users can disallow browsers that don't support a Content Security Policy, then this would be an effective workaround for this and all XSS vulnerabilities. Set CSP policies such as script-src 'self' to ensure that only scripts hosted on the same origin are executed, and explicitly prohibit inline scripts using script-src-elem.\n\n### References\n\nhttps://gist.github.com/th4s1s/3921fd9c3e324ad9a3e0d846166e3eb8\n\n### Credits\n\nThis vulnerability was reported by Hackerone researcher https://hackerone.com/lio346?type=user","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21610","reference_id":"","reference_type":"","scores":[{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35109","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34759","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34849","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34867","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35099","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35148","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35162","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35125","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35149","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35154","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35229","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35184","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35201","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.3518","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21610"},{"reference_url":"https://gist.github.com/th4s1s/3921fd9c3e324ad9a3e0d846166e3eb8","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-03T16:55:29Z/"}],"url":"https://gist.github.com/th4s1s/3921fd9c3e324ad9a3e0d846166e3eb8"},{"reference_url":"https://github.com/basecamp/trix","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/basecamp/trix"},{"reference_url":"https://github.com/basecamp/trix/commit/180c8d337f18e1569cea6ef29b4d03ffff5b5faa","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-03T16:55:29Z/"}],"url":"https://github.com/basecamp/trix/commit/180c8d337f18e1569cea6ef29b4d03ffff5b5faa"},{"reference_url":"https://github.com/basecamp/trix/commit/c4f0d6f80654603932af6685694f694e96593b93","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-03T16:55:29Z/"}],"url":"https://github.com/basecamp/trix/commit/c4f0d6f80654603932af6685694f694e96593b93"},{"reference_url":"https://github.com/basecamp/trix/security/advisories/GHSA-j386-3444-qgwg","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-03T16:55:29Z/"}],"url":"https://github.com/basecamp/trix/security/advisories/GHSA-j386-3444-qgwg"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21610","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21610"},{"reference_url":"https://github.com/advisories/GHSA-j386-3444-qgwg","reference_id":"GHSA-j386-3444-qgwg","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-j386-3444-qgwg"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/69100?format=json","purl":"pkg:npm/trix@2.1.12","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63mn-56k4-jbh4"},{"vulnerability":"VCID-d266-4vk3-buc1"},{"vulnerability":"VCID-k8n9-p3pp-8fh7"},{"vulnerability":"VCID-q1s4-ash2-5udy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/trix@2.1.12"}],"aliases":["CVE-2025-21610","GHSA-j386-3444-qgwg"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7qg1-2vaz-aqdu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/30333?format=json","vulnerability_id":"VCID-d266-4vk3-buc1","summary":"Trix vulnerable to Cross-site Scripting on copy & paste\n### Impact\nThe Trix editor, in versions prior to 2.1.15, is vulnerable to XSS attacks when pasting malicious code.\n\nAn attacker could trick a user to copy and paste malicious code that would execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed.\n\n### Patches\nUpdate Recommendation: Users should upgrade to Trix editor version 2.1.15 or later.\n\n### References\nThe XSS vulnerability was reported by HackerOne researcher [hiumee](https://hackerone.com/hiumee?type=user).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-46812","reference_id":"","reference_type":"","scores":[{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57436","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57448","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.5747","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57447","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.575","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57504","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57519","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57496","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57478","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57501","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.5748","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57438","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57457","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-46812"},{"reference_url":"https://github.com/basecamp/trix","reference_id":"","reference_type":"","scores":[{"value":"2.0","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P"},{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/basecamp/trix"},{"reference_url":"https://github.com/basecamp/trix/commit/75226089646841b0f774d8b152e5ec27d2d9e191","reference_id":"","reference_type":"","scores":[{"value":"2","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P"},{"value":"2.0","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P"},{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T19:58:29Z/"}],"url":"https://github.com/basecamp/trix/commit/75226089646841b0f774d8b152e5ec27d2d9e191"},{"reference_url":"https://github.com/basecamp/trix/security/advisories/GHSA-mcrw-746g-9q8h","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"2","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P"},{"value":"2.0","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P"},{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T19:58:29Z/"}],"url":"https://github.com/basecamp/trix/security/advisories/GHSA-mcrw-746g-9q8h"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2025-46812","reference_id":"","reference_type":"","scores":[{"value":"2.0","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P"},{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-46812"},{"reference_url":"https://github.com/advisories/GHSA-mcrw-746g-9q8h","reference_id":"GHSA-mcrw-746g-9q8h","reference_type":"","scores":[{"value":"LOW","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-mcrw-746g-9q8h"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71101?format=json","purl":"pkg:npm/trix@2.1.15","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63mn-56k4-jbh4"},{"vulnerability":"VCID-k8n9-p3pp-8fh7"},{"vulnerability":"VCID-q1s4-ash2-5udy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/trix@2.1.15"}],"aliases":["CVE-2025-46812","GHSA-mcrw-746g-9q8h"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d266-4vk3-buc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/25054?format=json","vulnerability_id":"VCID-k8n9-p3pp-8fh7","summary":"Trix has a Stored XSS vulnerability through serialized attributes\n### Impact\nThe Trix editor, in versions prior to 2.1.17, is vulnerable to XSS attacks when a `data-trix-serialized-attributes` attribute bypasses the DOMPurify sanitizer.\n\nAn attacker could craft HTML containing a `data-trix-serialized-attributes` attribute with a malicious payload that, when the content is rendered, could execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed.\n\n### Patches\nUpdate Recommendation: Users should upgrade to Trix editor version 2.1.17 or later.\n\n### References\nThe XSS vulnerability was responsibly reported by Hackerone researcher [newbiefromcoma](https://hackerone.com/newbiefromcoma).","references":[{"reference_url":"https://github.com/basecamp/trix","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/basecamp/trix"},{"reference_url":"https://github.com/basecamp/trix/commit/53197ab5a142e6b0b76127cb790726b274eaf1bc","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/basecamp/trix/commit/53197ab5a142e6b0b76127cb790726b274eaf1bc"},{"reference_url":"https://github.com/basecamp/trix/pull/1282","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/basecamp/trix/pull/1282"},{"reference_url":"https://github.com/basecamp/trix/releases/tag/v2.1.17","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/basecamp/trix/releases/tag/v2.1.17"},{"reference_url":"https://github.com/basecamp/trix/security/advisories/GHSA-qmpg-8xg6-ph5q","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3","scoring_elements":""},{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/basecamp/trix/security/advisories/GHSA-qmpg-8xg6-ph5q"},{"reference_url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/action_text-trix/GHSA-qmpg-8xg6-ph5q.yml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/action_text-trix/GHSA-qmpg-8xg6-ph5q.yml"},{"reference_url":"https://github.com/advisories/GHSA-qmpg-8xg6-ph5q","reference_id":"GHSA-qmpg-8xg6-ph5q","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-qmpg-8xg6-ph5q"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/68221?format=json","purl":"pkg:npm/trix@2.1.17","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63mn-56k4-jbh4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/trix@2.1.17"}],"aliases":["GHSA-qmpg-8xg6-ph5q"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k8n9-p3pp-8fh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/24149?format=json","vulnerability_id":"VCID-q1s4-ash2-5udy","summary":"Trix has a stored XSS vulnerability through its attachment attribute\nThe Trix editor, in versions prior to 2.1.16, is vulnerable to XSS attacks through attachment payloads.\n\nAn attacker could inject malicious code into a data-trix-attachment attribute that, when rendered as HTML and clicked on, could execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed.","references":[{"reference_url":"https://github.com/basecamp/trix","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/basecamp/trix"},{"reference_url":"https://github.com/basecamp/trix/commit/73c20cf03ab2b56c0ef9c9b1aaf63f2de44f4010","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/basecamp/trix/commit/73c20cf03ab2b56c0ef9c9b1aaf63f2de44f4010"},{"reference_url":"https://github.com/basecamp/trix/releases/tag/v2.1.16","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/basecamp/trix/releases/tag/v2.1.16"},{"reference_url":"https://github.com/advisories/GHSA-g9jg-w8vm-g96v","reference_id":"GHSA-g9jg-w8vm-g96v","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-g9jg-w8vm-g96v"},{"reference_url":"https://github.com/basecamp/trix/security/advisories/GHSA-g9jg-w8vm-g96v","reference_id":"GHSA-g9jg-w8vm-g96v","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3","scoring_elements":""},{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/basecamp/trix/security/advisories/GHSA-g9jg-w8vm-g96v"},{"reference_url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/action_text-trix/GHSA-g9jg-w8vm-g96v.yml","reference_id":"GHSA-g9jg-w8vm-g96v.yml","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/action_text-trix/GHSA-g9jg-w8vm-g96v.yml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/67223?format=json","purl":"pkg:npm/trix@2.1.16","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63mn-56k4-jbh4"},{"vulnerability":"VCID-k8n9-p3pp-8fh7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/trix@2.1.16"}],"aliases":["GHSA-g9jg-w8vm-g96v"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q1s4-ash2-5udy"}],"fixing_vulnerabilities":[],"risk_score":"3.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/trix@1.3.5"}