PyPi: Django-Tinymce

CVE-2024-38356

Safety vulnerability ID: 78730

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Jun 19, 2024 Updated at Sep 26, 2025
Scan your Python projects for vulnerabilities →

Advisory

Affected versions of the django-tinymce package are vulnerable to Cross-site Scripting (XSS) due to improper validation in the noneditable_regexp option. The content extraction code using the noneditable_regexp option fails to verify that HTML attribute contents fully conform to the configured regular expression before inclusion, allowing execution of embedded malicious scripts. An attacker can exploit this by including specially crafted HTML attributes that bypass the noneditable_regexp filter, causing django-tinymce to execute unintended script when content is extracted, compromising user confidentiality and integrity.

Affected package

django-tinymce

Latest version: 4.1.0

A Django application that contains a widget to render a

Affected versions

Fixed versions

Vulnerability changelog

This vulnerability has no description

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 6.1

CVSS v3 Details

MEDIUM 6.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
CHANGED
Confidentiality Impact (C)
LOW
Integrity Impact (I)
LOW
Availability Availability (A)
NONE