Vulnerabilities and security researches fortinymce-advanced tinymce-advanced
Direction: ascendingJun 07, 2024
Advanced Editor Tools # dc209836a0062d59d76258fcefe4c47c019379e2
- CVE, Research URL
- Home page URL
- Application
- Date
- Sep 08, 2014
- Research Description
- Advanced Editor Tools [tinymce-advanced] < 4.2.3 WordPress TinyMCE Advanced Plugin <= 4.1 - Cross Site Request Forgery This plugin is prone to a cross site request forgery vulnerability. Update the plugin.
- Affected versions
-
max 4.2.3.
- Status
-
vulnerable
May 01, 2026
Advanced Editor Tools # PSC-2026-64654
- PSC, Research URL
- Home page URL
- Application
- Date
- May 01, 2026
- Research Description
- Editor enhancement plugins operate directly on the boundary between content creation, rich-text formatting, block editor behavior, Classic Editor compatibility, and front-end rendering. These plugins influence how authors create content, how formatting is stored, how editor settings are applied, and how HTML produced by rich-text tools eventually appears on public pages. A weakness in this class of plugin can lead to stored XSS through editor content or settings, unauthorized configuration changes, unsafe handling of imported settings, editor privilege boundary failures, or rendering issues where user-controlled formatting reaches HTML, CSS, or attribute contexts. Advanced Editor Tools version 5.9.2, previously known as TinyMCE Advanced, has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64654, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for WordPress editor, TinyMCE, Classic Paragraph, toolbar customization, and rich-text formatting plugins.
- Affected versions
-
Min 5.9.2, max 5.9.2.
- Status
-
SAFE & CERTIFIED