Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions modules/ROOT/nav.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -417,6 +417,9 @@
** xref:tinymce-and-cors.adoc[Cross-Origin Resource Sharing (CORS)]
* Release information
** xref:release-notes.adoc[Release notes for {productname}]
*** {productname} 7.9.3
**** xref:7.9.3-release-notes.adoc#overview[Overview]
**** xref:7.9.3-release-notes.adoc#security-fixes[Security fixes]
*** {productname} 7.9.2
**** xref:7.9.2-release-notes.adoc#overview[Overview]
**** xref:7.9.2-release-notes.adoc#additions[Additions]
Expand Down
16 changes: 14 additions & 2 deletions modules/ROOT/pages/7.1-release-notes.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -384,9 +384,21 @@ In {productname} {release-version}, the Full Screen plugin has been modified to
== Security fixes


{productname} {release-version} includes one fix for the following security issue:
{productname} {release-version} includes fixes for the following security issues:

The following server-side component has been updated to include dependency updates addressing the following security issues.
=== Fixed stored XSS vulnerability using sanitization bypass through nested SVGs

A cross-site scripting (XSS) vulnerability was identified in {productname} 6.8.x through 7.0.x caused by improper SVG namespace scope handling in the sanitizer. A crafted payload using nested elements could bypass attribute sanitization and execute arbitrary JavaScript. {productname} {release-version} resolves this issue through a rewrite of the affected sanitizer code.

CVE: _pending_

GHSA: https://github.com/tinymce/tinymce/security/advisories/GHSA-mh5m-5hw4-5c69[GitHub Advisories].

NOTE: Tiny Technologies would like to thank https://maple3142.net[maple3142] of DEVCORE for discovering this vulnerability.

=== Updated server-side component dependencies

The following server-side component has been updated to include dependency updates addressing the following security issues.

* https://nvd.nist.gov/vuln/detail/CVE-2024-29025[CVE-2024-29025]

Expand Down
55 changes: 55 additions & 0 deletions modules/ROOT/pages/7.9.3-release-notes.adoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,55 @@
= {productname} {release-version}
:release-version: 7.9.3
:navtitle: {productname} {release-version}
:description: Release notes for {productname} {release-version}
:keywords: releasenotes, new, changes, bugfixes
:page-toclevels: 1

include::partial$misc/admon-releasenotes-for-stable.adoc[]


[[overview]]
== Overview

{productname} {release-version} was released for {enterpriseversion} and {cloudname} on Wednesday, May 20^th^, 2026. These release notes provide an overview of the changes for {productname} {release-version}, including:

* xref:security-fixes[Security fixes]


[[security-fixes]]
== Security fixes

{productname} {release-version} includes fixes for the following security issues:

=== Fixed stored XSS vulnerability using media plugin `data-mce-object` injection
// #TINY-14357

A stored cross-site scripting (XSS) vulnerability was identified in the media plugin. Malicious scripts could be injected through crafted `data-mce-object` and `data-mce-p-*` attributes, which were executed when content was rendered. {productname} {release-version} ensures that content with `data-mce-object` and `data-mce-p-*` attributes is properly sanitized when the media plugin is in use.

CVE: _pending_

GHSA: https://github.com/tinymce/tinymce/security/advisories/GHSA-vg35-5wq7-3x7w[GitHub Advisories].

NOTE: Tiny Technologies would like to thank https://github.com/UncleJ4ck[Aymane MAZGUITI] and https://github.com/ange-primiterra[Ange Primiterra] for discovering this vulnerability.

=== Fixed stored XSS vulnerability through `mce:protected` comments
// #TINY-14353

A stored cross-site scripting (XSS) vulnerability was identified through forged `mce:protected` comments. Attackers could bypass sanitization and inject scripts that executed when content was restored. This issue affected configurations using the `protect` option. {productname} {release-version} validates decoded `mce:protected` content against configured `protect` regex rules before restoring.

CVE: _pending_

GHSA: https://github.com/tinymce/tinymce/security/advisories/GHSA-v98h-vmpc-fpqv[GitHub Advisories].

NOTE: Tiny Technologies would like to thank https://github.com/he1d3n[Ivan Babenko (he1d3n)] for discovering this vulnerability.

=== Fixed stored XSS vulnerability through `data-mce-` prefixed `src`, `href`, `style` attributes
// #TINY-14333

A stored cross-site scripting (XSS) vulnerability was identified through unsanitized `data-mce-href`, `data-mce-src`, and `data-mce-style` attributes. Malicious values in these attributes could override safe attributes during serialization, bypassing validation. {productname} {release-version} strips unsafe `data-mce-*` attributes during parsing.

CVE: _pending_

GHSA: https://github.com/tinymce/tinymce/security/advisories/GHSA-q742-qvgc-gc2f[GitHub Advisories].

// Credits: Tadi Kadango (https://github.com/mtrill47) and Ivan Babenko (https://github.com/he1d3n) — pending permission to attribute
15 changes: 15 additions & 0 deletions modules/ROOT/pages/changelog.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,17 @@

NOTE: This is the {productname} Community version changelog. For information about the latest {cloudname} or {enterpriseversion} Release, see: xref:release-notes.adoc[{productname} Release Notes].

== xref:7.9.3-release-notes.adoc[7.9.3 - 2026-05-20]

=== Security

* Fixed stored XSS vulnerability using media plugin `data-mce-object` injection.
// #TINY-14357
* Fixed stored XSS vulnerability through `mce:protected` comments.
// #TINY-14353
* Fixed stored XSS vulnerability through `data-mce-` prefixed `src`, `href`, `style` attributes.
// #TINY-14333

== xref:7.9.2-release-notes.adoc[7.9.2 - 2026-02-11]

=== Deprecated
Expand Down Expand Up @@ -443,6 +454,10 @@ NOTE: This is the {productname} Community version changelog. For information abo
* The "Open Link" context menu action was not enabled for links on images.
// #TINY-10391

=== Security

* Fixed stored XSS vulnerability using sanitization bypass through nested SVGs.

== xref:7.0.1-release-notes.adoc[7.0.1 - 2024-04-10]

=== Fixed
Expand Down
6 changes: 6 additions & 0 deletions modules/ROOT/pages/release-notes.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,12 @@ This section lists the releases for {productname} 7 and the changes made in each
[cols="1,1"]
|===

a|
[.lead]
xref:7.9.3-release-notes.adoc#overview[{productname} 7.9.3]

Release notes for {productname} 7.9.3

a|
[.lead]
xref:7.9.2-release-notes.adoc#overview[{productname} 7.9.2]
Expand Down
Loading