|
| 1 | += TinyMCE {release-version} |
| 2 | +:release-version: 6.8.4 |
| 3 | +:navtitle: TinyMCE {release-version} |
| 4 | +:description: Release notes for TinyMCE {release-version} |
| 5 | +:keywords: releasenotes, new, changes, bugfixes |
| 6 | +:page-toclevels: 1 |
| 7 | + |
| 8 | +include::partial$misc/admon-releasenotes-for-stable.adoc[] |
| 9 | + |
| 10 | +[[overview]] |
| 11 | +== Overview |
| 12 | + |
| 13 | +{productname} {release-version} was released for {enterpriseversion} and {cloudname} on Wednesday, June 19^th^, 2024. These release notes provide an overview of the changes for {productname} {release-version}, including: |
| 14 | + |
| 15 | +* xref:security-fixes[Security fixes] |
| 16 | + |
| 17 | + |
| 18 | +[[security-fixes]] |
| 19 | +== Security fixes |
| 20 | + |
| 21 | +{productname} 6.8.4 includes two fixes for the following security issues: |
| 22 | + |
| 23 | +=== HTML entities that were double decoded in `noscript` elements caused an XSS vulnerability. |
| 24 | +// #TINY-11019 |
| 25 | + |
| 26 | +A https://owasp.org/www-community/attacks/xss/[cross-site scripting] (XSS) vulnerability was discovered in {productname}'s content parsing code. This allowed specially crafted `noscript` elements containing malicious code to be executed when that content was loaded into the editor. |
| 27 | + |
| 28 | +This vulnerability has been patched in {productname} 7.2.0, {productname} {release-version} and {productname} 5.11.0 LTS by ensuring that content within `noscript` elements are properly parsed. |
| 29 | + |
| 30 | +GHSA: link:https://github.com/tinymce/tinymce/security/advisories/GHSA-w9jx-4g6g-rp7x[GitHub Advisory]. |
| 31 | + |
| 32 | +CVE: Pending. |
| 33 | + |
| 34 | +NOTE: Tiny Technologies would like to thank link:https://malavkhatri.com/[Malav Khatri (devilbugbounty)] and another reporter for discovering this vulnerability. |
| 35 | + |
| 36 | +=== It was possible to inject XSS HTML that was not matching the regexp when using the `noneditable_regexp` option. |
| 37 | +// #TINY-11022 |
| 38 | + |
| 39 | +A https://owasp.org/www-community/attacks/xss/[cross-site scripting] (XSS) vulnerability was discovered in {productname}'s content extraction code. When using the `noneditable_regexp` option, specially crafted HTML attributes containing malicious code were able to be executed when content was extracted from the editor. |
| 40 | + |
| 41 | +This vulnerability has been patched in {productname} 7.2.0, {productname} {release-version} and {productname} 5.11.0 LTS by ensuring that, when using the `noneditable_regexp` option, any content within an attribute is properly verified to match the configured regular expression before being added. |
| 42 | + |
| 43 | +GHSA: link:https://github.com/tinymce/tinymce/security/advisories/GHSA-9hcv-j9pv-qmph[GitHub Advisory]. |
| 44 | + |
| 45 | +CVE: Pending. |
0 commit comments