Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 3 additions & 1 deletion modules/ROOT/nav.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -408,7 +408,9 @@
** xref:tinymce-and-cors.adoc[Cross-Origin Resource Sharing (CORS)]
* Release information
** xref:release-notes.adoc[Release notes for {productname}]
// Remove un-used-for-this-particular-release entries.
*** {productname} 8.5.1
**** xref:8.5.1-release-notes.adoc#overview[Overview]
**** xref:8.5.1-release-notes.adoc#security-fixes[Security fixes]
*** {productname} 8.5.0
**** xref:8.5.0-release-notes.adoc#overview[Overview]
**** xref:8.5.0-release-notes.adoc#accompanying-premium-plugin-changes[Accompanying Premium Plugin changes]
Expand Down
55 changes: 55 additions & 0 deletions modules/ROOT/pages/8.5.1-release-notes.adoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,55 @@
= {productname} {release-version}
:release-version: 8.5.1
:navtitle: {productname} {release-version}
:description: Release notes for {productname} {release-version}
:keywords: releasenotes, new, changes, bugfixes
:page-toclevels: 1

include::partial$misc/admon-releasenotes-for-stable.adoc[]


[[overview]]
== Overview

{productname} {release-version} was released for {enterpriseversion} and {cloudname} on Wednesday, May 20^th^, 2026. These release notes provide an overview of the changes for {productname} {release-version}, including:

* xref:security-fixes[Security fixes]


[[security-fixes]]
== Security fixes

{productname} {release-version} includes fixes for the following security issues:

=== Fixed stored XSS vulnerability using media plugin `data-mce-object` injection
// #TINY-14357

A stored cross-site scripting (XSS) vulnerability was identified in the media plugin. Malicious scripts could be injected through crafted `data-mce-object` and `data-mce-p-*` attributes, which were executed when content was rendered. {productname} {release-version} ensures that content with `data-mce-object` and `data-mce-p-*` attributes is properly sanitized when the media plugin is in use.

CVE: _pending_

GHSA: https://github.com/tinymce/tinymce/security/advisories/GHSA-vg35-5wq7-3x7w[GitHub Advisories].

NOTE: Tiny Technologies would like to thank https://github.com/UncleJ4ck[Aymane MAZGUITI] and https://github.com/ange-primiterra[Ange Primiterra] for discovering this vulnerability.

=== Fixed stored XSS vulnerability through `mce:protected` comments
// #TINY-14353

A stored cross-site scripting (XSS) vulnerability was identified through forged `mce:protected` comments. Attackers could bypass sanitization and inject scripts that executed when content was restored. This issue affected configurations using the `protect` option. {productname} {release-version} validates decoded `mce:protected` content against configured `protect` regex rules before restoring.

CVE: _pending_

GHSA: https://github.com/tinymce/tinymce/security/advisories/GHSA-v98h-vmpc-fpqv[GitHub Advisories].

NOTE: Tiny Technologies would like to thank https://github.com/he1d3n[Ivan Babenko (he1d3n)] for discovering this vulnerability.

=== Fixed stored XSS vulnerability through `data-mce-` prefixed `src`, `href`, `style` attributes
// #TINY-14333

A stored cross-site scripting (XSS) vulnerability was identified through unsanitized `data-mce-href`, `data-mce-src`, and `data-mce-style` attributes. Malicious values in these attributes could override safe attributes during serialization, bypassing validation. {productname} {release-version} strips unsafe `data-mce-*` attributes during parsing.

CVE: _pending_

GHSA: https://github.com/tinymce/tinymce/security/advisories/GHSA-q742-qvgc-gc2f[GitHub Advisories].

// Credits: Tadi Kadango (https://github.com/mtrill47) and Ivan Babenko (https://github.com/he1d3n) — pending permission to attribute
11 changes: 11 additions & 0 deletions modules/ROOT/pages/changelog.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,17 @@

NOTE: This is the {productname} Community version changelog. For information about the latest {cloudname} or {enterpriseversion} Release, see: xref:release-notes.adoc[{productname} Release Notes].

== xref:8.5.1-release-notes.adoc[8.5.1 - 2026-05-20]

=== Security

* Fixed stored XSS vulnerability using media plugin `data-mce-object` injection.
// #TINY-14357
* Fixed stored XSS vulnerability through `mce:protected` comments.
// #TINY-14353
* Fixed stored XSS vulnerability through `data-mce-` prefixed `src`, `href`, `style` attributes.
// #TINY-14333

== xref:8.5.0-release-notes.adoc[8.5.0 - 2026-04-29]

### Added
Expand Down
8 changes: 7 additions & 1 deletion modules/ROOT/pages/release-notes.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,12 @@ This section lists the releases for {productname} {productmajorversion} and the

[cols="1,1"]
|===
a|
[.lead]
xref:8.5.1-release-notes.adoc#overview[{productname} 8.5.1]

Release notes for {productname} 8.5.1

a|
[.lead]
xref:8.5.0-release-notes.adoc#overview[{productname} 8.5.0]
Expand Down Expand Up @@ -92,5 +98,5 @@ xref:8.0-release-notes.adoc#overview[{productname} 8.0.0]
Release notes for {productname} 8.0.0

// Uncomment the dummy cell when the number of cells in the table is odd to ensure the table renders correctly.
// a|
a|
|===
Loading