Cross-Site Scripting Vulnerability in Mendix Rich Text Widget
MonitorCVSS 5.7SSA-190588Nov 17, 2025
Siemens
Attack path
Attack VectorNetwork
Auth RequiredLow
ComplexityLow
User InteractionRequired
Summary
Mendix RichText widget (versions 4.0.0 to 4.6.0) contains a cross-site scripting (XSS) vulnerability that could allow an authenticated user to inject malicious scripts through the rich text editor.
What this means
What could happen
An authenticated user could inject malicious scripts that execute in the browser of other users viewing the content, potentially allowing credential theft or unauthorized actions within the application.
Who's at risk
Organizations using Mendix-based applications that include the RichText widget (especially those used for content creation, documentation, or user-facing forms in any sector including utilities, manufacturing, and critical infrastructure) should update immediately to prevent XSS attacks through user-generated content.
How it could be exploited
An attacker with valid application credentials enters malicious JavaScript code into a Mendix RichText field. When another user views or edits that content, the script executes in their browser with their privileges, allowing the attacker to steal session tokens, modify displayed data, or perform actions on behalf of the victim user.
Prerequisites
- Valid application login credentials
- Access to a form or interface containing the vulnerable Mendix RichText widget
- A victim user must view or interact with the page containing the injected payload
requires valid credentialsrequires user interactionlow complexity attackaffects web application availability and data integrity
Exploitability
Unlikely to be exploited — EPSS score 0.0%
Affected products (1)
ProductAffected VersionsFix Status
Mendix RichText≥ 4.0.0, < 4.6.14.6.1
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate Mendix RichText widget to version 4.6.1 or later
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/c9214fa7-120d-4568-b42d-f37b1057fda4Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.