You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/update_and_migration/from_3.3/update_from_3.3.md
+14-1Lines changed: 14 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -514,7 +514,7 @@ Adjust the web server configuration to prevent direct access to the `index.php`
514
514
515
515
See [the updated Apache and nginx template files](https://github.com/ibexa/post-install/pull/70/files) for more information.
516
516
517
-
### Removed `symfony/serializer-pack` dependency
517
+
####Removed `symfony/serializer-pack` dependency
518
518
519
519
This release no longer directly requires the `symfony/serializer-pack` Composer dependency, which can remove some dependencies from your project during the update process.
Then, verify that Symfony Flex installed the versions you were using before.
528
528
529
+
### v3.3.42
530
+
531
+
#### Security
532
+
533
+
This release fixes a critical vulnerability in the [RichText field type](richtextfield.md).
534
+
By entering a maliciously crafted input into the RichText field type's XML, the attacker could perform an attack using [XML external entity (XXE) injection](https://portswigger.net/web-security/xxe).
535
+
To exploit this vulnerability, an attacker would need to have edit permission to content with RichText fields.
536
+
537
+
For more information, see the [published security advisory IBEXA-SA-2025-002](https://developers.ibexa.co/security-advisories/ibexa-sa-2025-002-xxe-vulnerability-in-richtext).
538
+
539
+
Evaluate the vulnerability to determine whether you might have been affected.
Copy file name to clipboardExpand all lines: docs/update_and_migration/from_4.6/update_from_4.6.md
+15-1Lines changed: 15 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -292,4 +292,18 @@ There are no additional update steps to execute.
292
292
293
293
## v4.6.18
294
294
295
-
No additional steps needed.
295
+
No additional steps needed.
296
+
297
+
## v4.6.19
298
+
299
+
### Security
300
+
301
+
This release fixes a critical vulnerability in the [RichText field type](richtextfield.md).
302
+
By entering a maliciously crafted input into the RichText field type's XML, the attacker could perform an attack using [XML external entity (XXE) injection](https://portswigger.net/web-security/xxe).
303
+
To exploit this vulnerability, an attacker would need to have edit permission to content with RichText fields.
304
+
305
+
For more information, see the [published security advisory IBEXA-SA-2025-002](https://developers.ibexa.co/security-advisories/ibexa-sa-2025-002-xxe-vulnerability-in-richtext).
306
+
307
+
Evaluate the vulnerability to determine whether you might have been affected.
0 commit comments