The Trix editor, versions prior to 2.1.11, is vulnerable to XSS when pasting malicious code in the link field.
An attacker could trick the user to copy&paste a malicious javascript:
URL as a link that would execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed.
See https://gist.github.com/th4s1s/3921fd9c3e324ad9a3e0d846166e3eb8
Update Recommendation: Users should upgrade to Trix editor version 2.1.12 or later.
This is not really a workaround but something that should be considered in addition to upgrading to the patched version. If affected users can disallow browsers that don't support a Content Security Policy, then this would be an effective workaround for this and all XSS vulnerabilities. Set CSP policies such as script-src 'self' to ensure that only scripts hosted on the same origin are executed, and explicitly prohibit inline scripts using script-src-elem.
https://gist.github.com/th4s1s/3921fd9c3e324ad9a3e0d846166e3eb8
This vulnerability was reported by Hackerone researcher https://hackerone.com/lio346?type=user
{ "nvd_published_at": "2025-01-03T17:15:09Z", "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-01-03T16:29:58Z" }