In a statement, the developers mentioned that the problem relates to content that is not properly disinfected before being uploaded to the editor. For remediation, updated versions of TinyMCE 4 and 5 were released.
Users of any of these versions should upgrade to TinyMCE 4.9.7 and 5.1.4. In addition, it is mentioned that the affected plugins are the analyzer, the paste function and visualchars.
The security update for this vulnerability is now available. This fix addresses the problem by using the improved logic of the parser, in addition to the inclusion of an HTML cleaner, the full technical details found in the TinyMCE report.
The digital forensics expert who reported the vulnerability also revealed a workaround that involves disabling affected plugins and manually disinfecting content using the BeforeSetContent event.
According to the International Institute of Cyber Security (IICS), millions of san TinyMCE people on a daily basis, in addition to its plugins favor the operation of almost 40% of all websites in the world, so it was vital to find a solution for this vulnerability before threat actors began actively exploiting it in the wild.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.