PyPi: Django-Tinymce

CVE-2024-38357

Safety vulnerability ID: 78742

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Jun 19, 2024 Updated at Sep 26, 2025
Scan your Python projects for vulnerabilities →

Advisory

Affected versions of the django-tinymce package are vulnerable to Cross-site Scripting due to improper parsing of `noscript` content. The content parsing module fails to neutralize potentially malicious code embedded within `noscript` elements, allowing execution of unescaped input when loaded into the django-tinymce editor. An attacker can embed crafted `noscript` content in user-supplied input—such as HTML loaded into the editor—resulting in script execution in the editor’s context, which may lead to session hijacking, cookie theft, or other client-side compromise.

Affected package

django-tinymce

Latest version: 4.1.0

A Django application that contains a widget to render a

Affected versions

Fixed versions

Vulnerability changelog

This vulnerability has no description

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 6.1

CVSS v3 Details

MEDIUM 6.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
CHANGED
Confidentiality Impact (C)
LOW
Integrity Impact (I)
LOW
Availability Availability (A)
NONE