This security advisory resolves an XSS vulnerability in acronym custom tag in Rich Text, in the back office of the DXP. Back office access and varying levels of editing and management permissions are required to exploit this vulnerability. This typically means Editor or Administrator role, or similar. Injected XSS is persistent and may in some cases be reflected in the front office, possibly affecting end users. The fixes ensure XSS is escaped, and any existing injected XSS is rendered harmless.
See "Patched versions".
None.
https://developers.ibexa.co/security-advisories/ibexa-sa-2025-004-xss-and-enumeration-vulnerabilities-in-back-office
| Software | From | Fixed in |
|---|---|---|
ibexa / fieldtype-richtext
|
5.0.0 | 5.0.3 |
ibexa / fieldtype-richtext
|
4.6.0 | 4.6.25 |