ibexa/fieldtype-richtext has an XSS vulnerability via acronym custom tag in Rich Text
Moderate severity
GitHub Reviewed
Published
Oct 17, 2025
in
ibexa/fieldtype-richtext
•
Updated Oct 17, 2025
Package
Affected versions
>= 5.0.0, < 5.0.3
>= 4.6.0, < 4.6.25
Patched versions
5.0.3
4.6.25
Description
Published to the GitHub Advisory Database
Oct 17, 2025
Reviewed
Oct 17, 2025
Last updated
Oct 17, 2025
Impact
This security advisory resolves an XSS vulnerability in acronym custom tag in Rich Text, in the back office of the DXP. Back office access and varying levels of editing and management permissions are required to exploit this vulnerability. This typically means Editor or Administrator role, or similar. Injected XSS is persistent and may in some cases be reflected in the front office, possibly affecting end users. The fixes ensure XSS is escaped, and any existing injected XSS is rendered harmless.
Patches
See "Patched versions".
Workarounds
None.
References
https://developers.ibexa.co/security-advisories/ibexa-sa-2025-004-xss-and-enumeration-vulnerabilities-in-back-office
References