cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches fortinymce-advanced tinymce-advanced

Direction: ascending
Jun 07, 2024

Advanced Editor Tools # dc209836a0062d59d76258fcefe4c47c019379e2

Application

Advanced Editor Tools

Date
Sep 08, 2014
Research Description
Advanced Editor Tools [tinymce-advanced] < 4.2.3 WordPress TinyMCE Advanced Plugin <= 4.1 - Cross Site Request Forgery This plugin is prone to a cross site request forgery vulnerability. Update the plugin.
Affected versions
max 4.2.3.
Status
vulnerable
May 01, 2026

Advanced Editor Tools # PSC-2026-64654

PSC, Research URL

PSC-2026-64654

Application

Advanced Editor Tools

Date
May 01, 2026
Research Description
Editor enhancement plugins operate directly on the boundary between content creation, rich-text formatting, block editor behavior, Classic Editor compatibility, and front-end rendering. These plugins influence how authors create content, how formatting is stored, how editor settings are applied, and how HTML produced by rich-text tools eventually appears on public pages. A weakness in this class of plugin can lead to stored XSS through editor content or settings, unauthorized configuration changes, unsafe handling of imported settings, editor privilege boundary failures, or rendering issues where user-controlled formatting reaches HTML, CSS, or attribute contexts. Advanced Editor Tools version 5.9.2, previously known as TinyMCE Advanced, has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64654, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for WordPress editor, TinyMCE, Classic Paragraph, toolbar customization, and rich-text formatting plugins.
Affected versions
Min 5.9.2, max 5.9.2.
Status
SAFE & CERTIFIED