Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. ibexa/fieldtype-richtext
  4. ›
  5. GHSA-9qv6-4pwm-m68f

GHSA-9qv6-4pwm-m68f: Ibexa RichText Field Type XSS vulnerabilities in back office

June 13, 2025

This security advisory is a part of IBEXA-SA-2025-003, which resolves XSS vulnerabilities in several parts of the back office of Ibexa DXP. Back office access and varying levels of editing and management permissions are required to exploit these vulnerabilities. This typically means Editor or Administrator role, or similar. Injected XSS is persistent and can be reflected in the front office, possibly affecting end users. The fixes ensure XSS is escaped, and any existing injected XSS is rendered harmless.

References

  • developers.ibexa.co/security-advisories/ibexa-sa-2025-003-xss-vulnerabilities-in-back-office
  • github.com/advisories/GHSA-9qv6-4pwm-m68f
  • github.com/ibexa/fieldtype-richtext
  • github.com/ibexa/fieldtype-richtext/commit/4a4a170c7faa4807ae0f74c581481b835bab3caf
  • github.com/ibexa/fieldtype-richtext/security/advisories/GHSA-9qv6-4pwm-m68f

Code Behaviors & Features

Detect and mitigate GHSA-9qv6-4pwm-m68f with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 4.6.0-beta1 before 4.6.21

Fixed versions

  • 4.6.21

Solution

Upgrade to version 4.6.21 or above.

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

packagist/ibexa/fieldtype-richtext/GHSA-9qv6-4pwm-m68f.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:18:53 +0000.