Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. ibexa/fieldtype-richtext
  4. ›
  5. GHSA-8c2g-f8jm-5cr7

GHSA-8c2g-f8jm-5cr7: ibexa/fieldtype-richtext has an XSS vulnerability via acronym custom tag in Rich Text

October 17, 2025

This security advisory resolves an XSS vulnerability in acronym custom tag in Rich Text, in the back office of the DXP. Back office access and varying levels of editing and management permissions are required to exploit this vulnerability. This typically means Editor or Administrator role, or similar. Injected XSS is persistent and may in some cases be reflected in the front office, possibly affecting end users. The fixes ensure XSS is escaped, and any existing injected XSS is rendered harmless.

References

  • developers.ibexa.co/security-advisories/ibexa-sa-2025-004-xss-and-enumeration-vulnerabilities-in-back-office
  • github.com/advisories/GHSA-8c2g-f8jm-5cr7
  • github.com/ibexa/fieldtype-richtext
  • github.com/ibexa/fieldtype-richtext/security/advisories/GHSA-8c2g-f8jm-5cr7

Code Behaviors & Features

Detect and mitigate GHSA-8c2g-f8jm-5cr7 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 4.6.0 before 4.6.25, all versions starting from 5.0.0 before 5.0.3

Fixed versions

  • 5.0.3
  • 4.6.25

Solution

Upgrade to versions 4.6.25, 5.0.3 or above.

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

packagist/ibexa/fieldtype-richtext/GHSA-8c2g-f8jm-5cr7.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 08 Nov 2025 00:22:14 +0000.