Cross-Site Scripting Vulnerability in Mendix Rich Text Widget

MonitorCVSS 5.7SSA-190588Nov 17, 2025
Siemens
Attack path
Attack VectorNetwork
Auth RequiredLow
ComplexityLow
User InteractionRequired
Summary

Mendix RichText widget (versions 4.0.0 to 4.6.0) contains a cross-site scripting (XSS) vulnerability that could allow an authenticated user to inject malicious scripts through the rich text editor.

What this means
What could happen
An authenticated user could inject malicious scripts that execute in the browser of other users viewing the content, potentially allowing credential theft or unauthorized actions within the application.
Who's at risk
Organizations using Mendix-based applications that include the RichText widget (especially those used for content creation, documentation, or user-facing forms in any sector including utilities, manufacturing, and critical infrastructure) should update immediately to prevent XSS attacks through user-generated content.
How it could be exploited
An attacker with valid application credentials enters malicious JavaScript code into a Mendix RichText field. When another user views or edits that content, the script executes in their browser with their privileges, allowing the attacker to steal session tokens, modify displayed data, or perform actions on behalf of the victim user.
Prerequisites
  • Valid application login credentials
  • Access to a form or interface containing the vulnerable Mendix RichText widget
  • A victim user must view or interact with the page containing the injected payload
requires valid credentialsrequires user interactionlow complexity attackaffects web application availability and data integrity
Exploitability
Unlikely to be exploited — EPSS score 0.0%
Affected products (1)
ProductAffected VersionsFix Status
Mendix RichText≥ 4.0.0, < 4.6.14.6.1
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate Mendix RichText widget to version 4.6.1 or later
API: /api/v1/advisories/c9214fa7-120d-4568-b42d-f37b1057fda4

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.