CVE-2025-46812

Trix vulnerable to Cross-site Scripting on copy & paste

Trix is a what-you-see-is-what-you-get rich text editor for everyday writing. Versions prior to 2.1.15 are vulnerable to XSS attacks when pasting malicious code. An attacker could trick a user to copy and paste malicious code that would execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed. This issue has been patched in version 2.1.15.


We have discovered 4 live websites that are affected by CVE-2025-46812.

Run a Free Instant Scan




Affected Software

Product  Trix
Category Rich Text Editors
Vulnerable Domains4 live websites (100% of Trix install base)
Vulnerable Versions
  • from 0 through 2.1.15
Vulnerable Versions Count0 versions ( less than 0.1% of all versions)


Common Weakness Enumeration

CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')



Details

  • Published - May 8, 2025
  • Updated - May 8, 2025

Website Distribution by Country

Number of websites using CVE-2025-46812
United States1 websites



Turkey3 websites

Website Distribution by TLD

Number of websites using CVE-2025-46812
.com2 websites
.net1 websites

Websites affected by CVE-2025-46812

Top websites that are affected by CVE-2025-46812. Please click on the "Contact us" link to get more information.
DomainCountryRankContacts
*********.com Turkey**,***,***
*******.******.com United States**,***,***
*******.net Turkey**,***,***
******.tv Turkey***,***,***
See full domain list

FAQ

CVE-2025-46812 is Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Trix
A total of 4 websites have been identified as vulnerable to CVE-2025-46812, based on global website indexing conducted by WebTechSurvey.
The Trix is affected by the CVE-2025-46812 vulnerability.
Trix versions up to 2.1.15 are vulnerable to CVE-2025-46812.
CVE-2025-46812 is resolved in version 2.1.15 of Trix.