jodit 4.10.3 → 4.11.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (87) hide show
  1. package/CHANGELOG.md +28 -0
  2. package/es2015/jodit.css +1 -1
  3. package/es2015/jodit.fat.min.js +15 -15
  4. package/es2015/jodit.js +359 -62
  5. package/es2015/jodit.min.js +7 -7
  6. package/es2015/plugins/debug/debug.css +1 -1
  7. package/es2015/plugins/debug/debug.js +1 -1
  8. package/es2015/plugins/debug/debug.min.js +1 -1
  9. package/es2015/plugins/speech-recognize/speech-recognize.css +1 -1
  10. package/es2015/plugins/speech-recognize/speech-recognize.js +1 -1
  11. package/es2015/plugins/speech-recognize/speech-recognize.min.js +1 -1
  12. package/es2018/jodit.fat.min.js +6 -6
  13. package/es2018/jodit.min.js +15 -15
  14. package/es2018/plugins/debug/debug.min.js +1 -1
  15. package/es2018/plugins/speech-recognize/speech-recognize.min.js +1 -1
  16. package/es2021/jodit.css +1 -1
  17. package/es2021/jodit.fat.min.js +8 -8
  18. package/es2021/jodit.js +358 -62
  19. package/es2021/jodit.min.js +9 -9
  20. package/es2021/plugins/debug/debug.css +1 -1
  21. package/es2021/plugins/debug/debug.js +1 -1
  22. package/es2021/plugins/debug/debug.min.js +1 -1
  23. package/es2021/plugins/speech-recognize/speech-recognize.css +1 -1
  24. package/es2021/plugins/speech-recognize/speech-recognize.js +1 -1
  25. package/es2021/plugins/speech-recognize/speech-recognize.min.js +1 -1
  26. package/es2021.en/jodit.css +1 -1
  27. package/es2021.en/jodit.fat.min.js +50 -50
  28. package/es2021.en/jodit.js +358 -62
  29. package/es2021.en/jodit.min.js +25 -25
  30. package/es2021.en/plugins/debug/debug.css +1 -1
  31. package/es2021.en/plugins/debug/debug.js +1 -1
  32. package/es2021.en/plugins/debug/debug.min.js +1 -1
  33. package/es2021.en/plugins/speech-recognize/speech-recognize.css +1 -1
  34. package/es2021.en/plugins/speech-recognize/speech-recognize.js +1 -1
  35. package/es2021.en/plugins/speech-recognize/speech-recognize.min.js +1 -1
  36. package/es5/jodit.css +2 -2
  37. package/es5/jodit.fat.min.js +2 -2
  38. package/es5/jodit.js +416 -62
  39. package/es5/jodit.min.css +2 -2
  40. package/es5/jodit.min.js +2 -2
  41. package/es5/plugins/debug/debug.css +1 -1
  42. package/es5/plugins/debug/debug.js +1 -1
  43. package/es5/plugins/debug/debug.min.js +1 -1
  44. package/es5/plugins/speech-recognize/speech-recognize.css +1 -1
  45. package/es5/plugins/speech-recognize/speech-recognize.js +1 -1
  46. package/es5/plugins/speech-recognize/speech-recognize.min.js +1 -1
  47. package/es5/polyfills.fat.min.js +1 -1
  48. package/es5/polyfills.js +1 -1
  49. package/es5/polyfills.min.js +1 -1
  50. package/esm/config.d.ts +85 -0
  51. package/esm/core/constants.js +1 -1
  52. package/esm/core/dom/dom.d.ts +1 -0
  53. package/esm/core/helpers/html/safe-html.d.ts +3 -2
  54. package/esm/core/helpers/html/safe-html.js +42 -3
  55. package/esm/plugins/clean-html/clean-html.js +4 -0
  56. package/esm/plugins/clean-html/config.d.ts +85 -0
  57. package/esm/plugins/clean-html/config.js +7 -1
  58. package/esm/plugins/clean-html/helpers/visitor/filters/convert-unsafe-embeds.d.ts +14 -0
  59. package/esm/plugins/clean-html/helpers/visitor/filters/convert-unsafe-embeds.js +37 -0
  60. package/esm/plugins/clean-html/helpers/visitor/filters/index.d.ts +4 -0
  61. package/esm/plugins/clean-html/helpers/visitor/filters/index.js +4 -0
  62. package/esm/plugins/clean-html/helpers/visitor/filters/safe-links-target.d.ts +14 -0
  63. package/esm/plugins/clean-html/helpers/visitor/filters/safe-links-target.js +38 -0
  64. package/esm/plugins/clean-html/helpers/visitor/filters/sandbox-iframes-in-content.d.ts +14 -0
  65. package/esm/plugins/clean-html/helpers/visitor/filters/sandbox-iframes-in-content.js +24 -0
  66. package/esm/plugins/clean-html/helpers/visitor/filters/sanitize-attributes.js +10 -5
  67. package/esm/plugins/clean-html/helpers/visitor/filters/sanitize-styles.d.ts +14 -0
  68. package/esm/plugins/clean-html/helpers/visitor/filters/sanitize-styles.js +70 -0
  69. package/esm/plugins/drag-and-drop/drag-and-drop.js +1 -1
  70. package/esm/plugins/enter/helpers/insert-paragraph.js +2 -1
  71. package/esm/plugins/file/file.js +3 -2
  72. package/esm/plugins/iframe/iframe.js +8 -6
  73. package/esm/plugins/image/image.js +3 -2
  74. package/esm/plugins/image-properties/writers/link.js +6 -0
  75. package/esm/plugins/link/link.js +15 -3
  76. package/esm/plugins/resizer/resizer.js +2 -2
  77. package/esm/plugins/source/editor/engines/area.js +3 -7
  78. package/package.json +1 -1
  79. package/types/config.d.ts +85 -0
  80. package/types/core/dom/dom.d.ts +1 -0
  81. package/types/core/helpers/html/safe-html.d.ts +3 -2
  82. package/types/plugins/clean-html/config.d.ts +85 -0
  83. package/types/plugins/clean-html/helpers/visitor/filters/convert-unsafe-embeds.d.ts +14 -0
  84. package/types/plugins/clean-html/helpers/visitor/filters/index.d.ts +4 -0
  85. package/types/plugins/clean-html/helpers/visitor/filters/safe-links-target.d.ts +14 -0
  86. package/types/plugins/clean-html/helpers/visitor/filters/sandbox-iframes-in-content.d.ts +14 -0
  87. package/types/plugins/clean-html/helpers/visitor/filters/sanitize-styles.d.ts +14 -0
@@ -0,0 +1,70 @@
1
+ /*!
2
+ * Jodit Editor (https://xdsoft.net/jodit/)
3
+ * Released under MIT see LICENSE.txt in the project root for license information.
4
+ * Copyright (c) 2013-2026 Valerii Chupurnov. All rights reserved. https://xdsoft.net
5
+ */
6
+ import { Dom } from "../../../../../core/dom/dom.js";
7
+ import { attr } from "../../../../../core/helpers/utils/attr.js";
8
+ /**
9
+ * Filter CSS properties in style attributes based on allowedStyles whitelist
10
+ * @private
11
+ */
12
+ export function sanitizeStyles(jodit, nodeElm, hadEffect) {
13
+ const allowedStyles = jodit.o.cleanHTML.allowedStyles;
14
+ if (!allowedStyles || !Dom.isElement(nodeElm)) {
15
+ return hadEffect;
16
+ }
17
+ const elm = nodeElm;
18
+ const style = attr(elm, 'style');
19
+ if (!style) {
20
+ return hadEffect;
21
+ }
22
+ const tagName = nodeElm.nodeName.toLowerCase();
23
+ const allowed = getAllowedPropsForTag(tagName, allowedStyles);
24
+ if (!allowed) {
25
+ return hadEffect;
26
+ }
27
+ const filtered = filterStyleProperties(style, allowed);
28
+ if (filtered !== style) {
29
+ attr(elm, 'style', filtered || null);
30
+ return true;
31
+ }
32
+ return hadEffect;
33
+ }
34
+ function getAllowedPropsForTag(tagName, allowedStyles) {
35
+ const tagSpecific = allowedStyles[tagName];
36
+ const global = allowedStyles['*'];
37
+ if (!tagSpecific && !global) {
38
+ return null;
39
+ }
40
+ const set = new Set();
41
+ if (global) {
42
+ for (const prop of global) {
43
+ set.add(prop.toLowerCase());
44
+ }
45
+ }
46
+ if (tagSpecific) {
47
+ for (const prop of tagSpecific) {
48
+ set.add(prop.toLowerCase());
49
+ }
50
+ }
51
+ return set;
52
+ }
53
+ function filterStyleProperties(style, allowed) {
54
+ return style
55
+ .split(';')
56
+ .map(s => s.trim())
57
+ .filter(s => {
58
+ if (!s) {
59
+ return false;
60
+ }
61
+ const colonIdx = s.indexOf(':');
62
+ if (colonIdx === -1) {
63
+ return false;
64
+ }
65
+ const prop = s.substring(0, colonIdx).trim().toLowerCase();
66
+ return allowed.has(prop);
67
+ })
68
+ .join('; ')
69
+ .replace(/;\s*$/, '');
70
+ }
@@ -132,7 +132,7 @@ export class dragAndDrop extends Plugin {
132
132
  ? ['a', 'href']
133
133
  : ['img', 'src'];
134
134
  fragment = this.j.createInside.element(tagName);
135
- fragment.setAttribute(field, attr(this.draggable, 'data-src') ||
135
+ attr(fragment, field, attr(this.draggable, 'data-src') ||
136
136
  attr(this.draggable, 'src') ||
137
137
  '');
138
138
  if (tagName === 'a') {
@@ -4,6 +4,7 @@
4
4
  * Copyright (c) 2013-2026 Valerii Chupurnov. All rights reserved. https://xdsoft.net
5
5
  */
6
6
  import { Dom } from "../../../core/dom/dom.js";
7
+ import { attr } from "../../../core/helpers/utils/attr.js";
7
8
  import { scrollIntoViewIfNeeded } from "../../../core/helpers/utils/scroll-into-view.js";
8
9
  /**
9
10
  * Insert default paragraph
@@ -15,7 +16,7 @@ export function insertParagraph(fake, editor, wrapperTag, style) {
15
16
  p.appendChild(br);
16
17
  }
17
18
  if (style && style.cssText) {
18
- p.setAttribute('style', style.cssText);
19
+ attr(p, 'style', style.cssText);
19
20
  }
20
21
  Dom.after(fake, p);
21
22
  Dom.before(isBR ? p : br, fake);
@@ -5,6 +5,7 @@
5
5
  */
6
6
  import { Dom } from "../../core/dom/dom.js";
7
7
  import { pluginSystem } from "../../core/global.js";
8
+ import { attr } from "../../core/helpers/utils/attr.js";
8
9
  import { Config } from "../../config.js";
9
10
  import { FileSelectorWidget } from "../../modules/widget/index.js";
10
11
  Config.prototype.controls.file = {
@@ -29,8 +30,8 @@ Config.prototype.controls.file = {
29
30
  upload: true,
30
31
  url: (url, text) => {
31
32
  if (sourceAnchor) {
32
- sourceAnchor.setAttribute('href', url);
33
- sourceAnchor.setAttribute('title', text);
33
+ attr(sourceAnchor, 'href', url);
34
+ attr(sourceAnchor, 'title', text);
34
35
  }
35
36
  else {
36
37
  insert(url, text);
@@ -39,8 +39,8 @@ export function iframe(editor) {
39
39
  if (opt.iframeCSSLinks) {
40
40
  opt.iframeCSSLinks.forEach(href => {
41
41
  const link = doc.createElement('link');
42
- link.setAttribute('rel', 'stylesheet');
43
- link.setAttribute('href', href);
42
+ attr(link, 'rel', 'stylesheet');
43
+ attr(link, 'href', href);
44
44
  doc.head && doc.head.appendChild(link);
45
45
  });
46
46
  }
@@ -58,11 +58,13 @@ export function iframe(editor) {
58
58
  iframe.style.display = 'block';
59
59
  iframe.src = 'about:blank';
60
60
  iframe.className = 'jodit-wysiwyg_iframe';
61
- iframe.setAttribute('allowtransparency', 'true');
62
- iframe.setAttribute('tabindex', opt.tabIndex.toString());
63
- iframe.setAttribute('frameborder', '0');
61
+ attr(iframe, {
62
+ allowtransparency: 'true',
63
+ tabindex: opt.tabIndex.toString(),
64
+ frameborder: '0'
65
+ });
64
66
  if (opt.iframeSandbox != null) {
65
- iframe.setAttribute('sandbox', opt.iframeSandbox);
67
+ attr(iframe, 'sandbox', opt.iframeSandbox);
66
68
  }
67
69
  editor.workplace.appendChild(iframe);
68
70
  editor.iframe = iframe;
@@ -6,6 +6,7 @@
6
6
  import { Dom } from "../../core/dom/index.js";
7
7
  import { pluginSystem } from "../../core/global.js";
8
8
  import { $$ } from "../../core/helpers/index.js";
9
+ import { attr } from "../../core/helpers/utils/attr.js";
9
10
  import { Icon } from "../../core/ui/icon.js";
10
11
  import { Config } from "../../config.js";
11
12
  import { FileSelectorWidget } from "../../modules/widget/index.js";
@@ -37,8 +38,8 @@ Config.prototype.controls.image = {
37
38
  url = '//' + url;
38
39
  }
39
40
  const image = sourceImage || editor.createInside.element('img');
40
- image.setAttribute('src', url);
41
- image.setAttribute('alt', text);
41
+ attr(image, 'src', url);
42
+ attr(image, 'alt', text);
42
43
  if (!sourceImage) {
43
44
  await editor.s.insertImage(image, null, editor.o.imageDefaultWidth);
44
45
  }
@@ -15,6 +15,12 @@ export function applyLink(j, image, imageLink, imageLinkOpenInNewTab) {
15
15
  }
16
16
  attr(link, 'href', imageLink);
17
17
  attr(link, 'target', imageLinkOpenInNewTab ? '_blank' : null);
18
+ if (!imageLinkOpenInNewTab) {
19
+ const relParts = (attr(link, 'rel') || '')
20
+ .split(/\s+/)
21
+ .filter(p => p && p !== 'noopener' && p !== 'noreferrer');
22
+ attr(link, 'rel', relParts.length ? relParts.join(' ') : null);
23
+ }
18
24
  }
19
25
  else {
20
26
  if (link && link.parentNode) {
@@ -90,7 +90,7 @@ export class link extends Plugin {
90
90
  }
91
91
  if (jodit.s.isCollapsed()) {
92
92
  const a = jodit.createInside.element('a');
93
- a.setAttribute('href', html);
93
+ attr(a, 'href', html);
94
94
  a.textContent = html;
95
95
  jodit.e.fire('applyLink', jodit, a, null);
96
96
  return a;
@@ -155,7 +155,9 @@ export class link extends Plugin {
155
155
  target_checkbox.checked = attr(link, 'target') === '_blank';
156
156
  }
157
157
  if (noFollowCheckbox && nofollow_checkbox) {
158
- nofollow_checkbox.checked = attr(link, 'rel') === 'nofollow';
158
+ nofollow_checkbox.checked = (attr(link, 'rel') || '')
159
+ .split(/\s+/)
160
+ .includes('nofollow');
159
161
  }
160
162
  insert.textContent = i18n('Update');
161
163
  }
@@ -219,7 +221,17 @@ export class link extends Plugin {
219
221
  attr(a, 'target', target_checkbox.checked ? '_blank' : null);
220
222
  }
221
223
  if (noFollowCheckbox && nofollow_checkbox) {
222
- attr(a, 'rel', nofollow_checkbox.checked ? 'nofollow' : null);
224
+ const relParts = (attr(a, 'rel') || '')
225
+ .split(/\s+/)
226
+ .filter(Boolean);
227
+ const hasNofollow = relParts.includes('nofollow');
228
+ if (nofollow_checkbox.checked && !hasNofollow) {
229
+ relParts.push('nofollow');
230
+ }
231
+ else if (!nofollow_checkbox.checked && hasNofollow) {
232
+ relParts.splice(relParts.indexOf('nofollow'), 1);
233
+ }
234
+ attr(a, 'rel', relParts.length ? relParts.join(' ') : null);
223
235
  }
224
236
  jodit.e.fire('applyLink', jodit, a, form);
225
237
  });
@@ -366,8 +366,8 @@ export class resizer extends Plugin {
366
366
  })
367
367
  .off(element, 'changesize')
368
368
  .on(element, 'changesize', () => {
369
- iframe.setAttribute('width', element.offsetWidth + 'px');
370
- iframe.setAttribute('height', element.offsetHeight + 'px');
369
+ attr(iframe, 'width', element.offsetWidth + 'px');
370
+ attr(iframe, 'height', element.offsetHeight + 'px');
371
371
  });
372
372
  }
373
373
  this.j.e.on(element, 'dragstart', this.hide);
@@ -4,6 +4,7 @@
4
4
  * Copyright (c) 2013-2026 Valerii Chupurnov. All rights reserved. https://xdsoft.net
5
5
  */
6
6
  import { Dom } from "../../../../core/dom/dom.js";
7
+ import { attr } from "../../../../core/helpers/utils/attr.js";
7
8
  import { css } from "../../../../core/helpers/utils/css.js";
8
9
  import { SourceEditor } from "../sourceEditor.js";
9
10
  export class TextAreaEditor extends SourceEditor {
@@ -73,15 +74,10 @@ export class TextAreaEditor extends SourceEditor {
73
74
  this.instance.blur();
74
75
  }
75
76
  setPlaceHolder(title) {
76
- this.instance.setAttribute('placeholder', title);
77
+ attr(this.instance, 'placeholder', title);
77
78
  }
78
79
  setReadOnly(isReadOnly) {
79
- if (isReadOnly) {
80
- this.instance.setAttribute('readonly', 'true');
81
- }
82
- else {
83
- this.instance.removeAttribute('readonly');
84
- }
80
+ attr(this.instance, 'readonly', isReadOnly ? 'true' : null);
85
81
  }
86
82
  selectAll() {
87
83
  this.instance.select();
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "jodit",
3
- "version": "4.10.3",
3
+ "version": "4.11.2",
4
4
  "description": "Jodit is an awesome and useful wysiwyg editor with filebrowser",
5
5
  "main": "esm/index.js",
6
6
  "types": "types/index.d.ts",
package/types/config.d.ts CHANGED
@@ -947,13 +947,98 @@ interface Config {
947
947
  */
948
948
  useIframeSandbox: boolean;
949
949
  /**
950
+ * @deprecated Use `removeEventAttributes` instead
950
951
  * Remove onError attributes
951
952
  */
952
953
  removeOnError: boolean;
954
+ /**
955
+ * Remove all `on*` event handler attributes (onerror, onclick, onload, onmouseover, etc.)
956
+ * When enabled, this replaces the legacy `removeOnError` behavior with comprehensive protection.
957
+ *
958
+ * ```javascript
959
+ * Jodit.make('#editor', {
960
+ * cleanHTML: {
961
+ * removeEventAttributes: true
962
+ * }
963
+ * });
964
+ * ```
965
+ */
966
+ removeEventAttributes: boolean;
953
967
  /**
954
968
  * Safe href="javascript:" links
955
969
  */
956
970
  safeJavaScriptLink: boolean;
971
+ /**
972
+ * Automatically add `rel="noopener noreferrer"` to links with `target="_blank"`
973
+ *
974
+ * ```javascript
975
+ * Jodit.make('#editor', {
976
+ * cleanHTML: {
977
+ * safeLinksTarget: true
978
+ * }
979
+ * });
980
+ * ```
981
+ */
982
+ safeLinksTarget: boolean;
983
+ /**
984
+ * Whitelist of allowed CSS properties inside `style` attributes.
985
+ * If set, all CSS properties not in the list will be removed.
986
+ *
987
+ * ```javascript
988
+ * Jodit.make('#editor', {
989
+ * cleanHTML: {
990
+ * allowedStyles: {
991
+ * '*': ['color', 'background-color', 'font-size', 'text-align'],
992
+ * img: ['width', 'height']
993
+ * }
994
+ * }
995
+ * });
996
+ * ```
997
+ */
998
+ allowedStyles: false | IDictionary<string[]>;
999
+ /**
1000
+ * Custom sanitizer function. Called after Jodit's built-in sanitization.
1001
+ * Use this to integrate DOMPurify or other external sanitizers.
1002
+ *
1003
+ * ```javascript
1004
+ * import DOMPurify from 'dompurify';
1005
+ *
1006
+ * Jodit.make('#editor', {
1007
+ * cleanHTML: {
1008
+ * sanitizer: (html) => DOMPurify.sanitize(html)
1009
+ * }
1010
+ * });
1011
+ * ```
1012
+ */
1013
+ sanitizer: false | ((value: string) => string);
1014
+ /**
1015
+ * Automatically add `sandbox=""` attribute to all `<iframe>` elements in editor content.
1016
+ * Prevents embedded content from running scripts or accessing the parent page.
1017
+ *
1018
+ * ```javascript
1019
+ * Jodit.make('#editor', {
1020
+ * cleanHTML: {
1021
+ * sandboxIframesInContent: true
1022
+ * }
1023
+ * });
1024
+ * ```
1025
+ */
1026
+ sandboxIframesInContent: boolean;
1027
+ /**
1028
+ * Convert unsafe embed elements to sandboxed `<iframe>`.
1029
+ * - `['object', 'embed']` — default
1030
+ * - `false` — disabled
1031
+ * - `string[]` — custom list of tag names to convert
1032
+ *
1033
+ * ```javascript
1034
+ * Jodit.make('#editor', {
1035
+ * cleanHTML: {
1036
+ * convertUnsafeEmbeds: Jodit.atom(['object', 'embed', 'applet'])
1037
+ * }
1038
+ * });
1039
+ * ```
1040
+ */
1041
+ convertUnsafeEmbeds: false | string[];
957
1042
  /**
958
1043
  * The allowTags option defines which elements will remain in the
959
1044
  * edited text when the editor saves. You can use this limit the returned HTML.
@@ -52,6 +52,7 @@ export declare class Dom {
52
52
  */
53
53
  static replace<T extends HTMLElement>(elm: Node, newTagName: HTMLTagNames): T;
54
54
  static replace<T extends HTMLElement>(elm: Node, newTagName: HTMLTagNames, create: ICreate, withAttributes?: boolean, notMoveContent?: boolean): T;
55
+ static replace<T extends Node>(elm: Node, newTagName: T): T;
55
56
  static replace<T extends Node>(elm: Node, newTagName: T | string, create?: ICreate, withAttributes?: boolean, notMoveContent?: boolean): T;
56
57
  /**
57
58
  * Checks whether the Node text and blank (in this case it may contain invisible auxiliary characters ,
@@ -3,13 +3,14 @@
3
3
  * Released under MIT see LICENSE.txt in the project root for license information.
4
4
  * Copyright (c) 2013-2026 Valerii Chupurnov. All rights reserved. https://xdsoft.net
5
5
  */
6
- type safeOptions = {
6
+ export type safeOptions = {
7
7
  removeOnError: boolean;
8
8
  safeJavaScriptLink: boolean;
9
+ removeEventAttributes?: boolean;
10
+ safeLinksTarget?: boolean;
9
11
  };
10
12
  /**
11
13
  * Removes dangerous constructs from HTML
12
14
  */
13
15
  export declare function safeHTML(box: HTMLElement | DocumentFragment, options: safeOptions): void;
14
16
  export declare function sanitizeHTMLElement(elm: Element | DocumentFragment, { safeJavaScriptLink, removeOnError }?: safeOptions): boolean;
15
- export {};
@@ -41,13 +41,98 @@ declare module 'jodit/config' {
41
41
  */
42
42
  useIframeSandbox: boolean;
43
43
  /**
44
+ * @deprecated Use `removeEventAttributes` instead
44
45
  * Remove onError attributes
45
46
  */
46
47
  removeOnError: boolean;
48
+ /**
49
+ * Remove all `on*` event handler attributes (onerror, onclick, onload, onmouseover, etc.)
50
+ * When enabled, this replaces the legacy `removeOnError` behavior with comprehensive protection.
51
+ *
52
+ * ```javascript
53
+ * Jodit.make('#editor', {
54
+ * cleanHTML: {
55
+ * removeEventAttributes: true
56
+ * }
57
+ * });
58
+ * ```
59
+ */
60
+ removeEventAttributes: boolean;
47
61
  /**
48
62
  * Safe href="javascript:" links
49
63
  */
50
64
  safeJavaScriptLink: boolean;
65
+ /**
66
+ * Automatically add `rel="noopener noreferrer"` to links with `target="_blank"`
67
+ *
68
+ * ```javascript
69
+ * Jodit.make('#editor', {
70
+ * cleanHTML: {
71
+ * safeLinksTarget: true
72
+ * }
73
+ * });
74
+ * ```
75
+ */
76
+ safeLinksTarget: boolean;
77
+ /**
78
+ * Whitelist of allowed CSS properties inside `style` attributes.
79
+ * If set, all CSS properties not in the list will be removed.
80
+ *
81
+ * ```javascript
82
+ * Jodit.make('#editor', {
83
+ * cleanHTML: {
84
+ * allowedStyles: {
85
+ * '*': ['color', 'background-color', 'font-size', 'text-align'],
86
+ * img: ['width', 'height']
87
+ * }
88
+ * }
89
+ * });
90
+ * ```
91
+ */
92
+ allowedStyles: false | IDictionary<string[]>;
93
+ /**
94
+ * Custom sanitizer function. Called after Jodit's built-in sanitization.
95
+ * Use this to integrate DOMPurify or other external sanitizers.
96
+ *
97
+ * ```javascript
98
+ * import DOMPurify from 'dompurify';
99
+ *
100
+ * Jodit.make('#editor', {
101
+ * cleanHTML: {
102
+ * sanitizer: (html) => DOMPurify.sanitize(html)
103
+ * }
104
+ * });
105
+ * ```
106
+ */
107
+ sanitizer: false | ((value: string) => string);
108
+ /**
109
+ * Automatically add `sandbox=""` attribute to all `<iframe>` elements in editor content.
110
+ * Prevents embedded content from running scripts or accessing the parent page.
111
+ *
112
+ * ```javascript
113
+ * Jodit.make('#editor', {
114
+ * cleanHTML: {
115
+ * sandboxIframesInContent: true
116
+ * }
117
+ * });
118
+ * ```
119
+ */
120
+ sandboxIframesInContent: boolean;
121
+ /**
122
+ * Convert unsafe embed elements to sandboxed `<iframe>`.
123
+ * - `['object', 'embed']` — default
124
+ * - `false` — disabled
125
+ * - `string[]` — custom list of tag names to convert
126
+ *
127
+ * ```javascript
128
+ * Jodit.make('#editor', {
129
+ * cleanHTML: {
130
+ * convertUnsafeEmbeds: Jodit.atom(['object', 'embed', 'applet'])
131
+ * }
132
+ * });
133
+ * ```
134
+ */
135
+ convertUnsafeEmbeds: false | string[];
51
136
  /**
52
137
  * The allowTags option defines which elements will remain in the
53
138
  * edited text when the editor saves. You can use this limit the returned HTML.
@@ -0,0 +1,14 @@
1
+ /*!
2
+ * Jodit Editor (https://xdsoft.net/jodit/)
3
+ * Released under MIT see LICENSE.txt in the project root for license information.
4
+ * Copyright (c) 2013-2026 Valerii Chupurnov. All rights reserved. https://xdsoft.net
5
+ */
6
+ /**
7
+ * @module plugins/clean-html
8
+ */
9
+ import type { IJodit } from "../../../../../types/index";
10
+ /**
11
+ * Convert `<object>` and `<embed>` elements to safer `<iframe>` elements.
12
+ * @private
13
+ */
14
+ export declare function convertUnsafeEmbeds(jodit: IJodit, nodeElm: Node, hadEffect: boolean): boolean;
@@ -10,9 +10,13 @@
10
10
  * @private
11
11
  */
12
12
  export * from "./allow-attributes";
13
+ export * from "./convert-unsafe-embeds";
13
14
  export * from "./fill-empty-paragraph";
14
15
  export * from "./remove-empty-text-node";
15
16
  export * from "./remove-inv-text-nodes";
16
17
  export * from "./replace-old-tags";
18
+ export * from "./safe-links-target";
19
+ export * from "./sandbox-iframes-in-content";
17
20
  export * from "./sanitize-attributes";
21
+ export * from "./sanitize-styles";
18
22
  export * from "./try-remove-node";
@@ -0,0 +1,14 @@
1
+ /*!
2
+ * Jodit Editor (https://xdsoft.net/jodit/)
3
+ * Released under MIT see LICENSE.txt in the project root for license information.
4
+ * Copyright (c) 2013-2026 Valerii Chupurnov. All rights reserved. https://xdsoft.net
5
+ */
6
+ /**
7
+ * @module plugins/clean-html
8
+ */
9
+ import type { IJodit } from "../../../../../types/index";
10
+ /**
11
+ * Automatically add `rel="noopener noreferrer"` to links with `target="_blank"`
12
+ * @private
13
+ */
14
+ export declare function safeLinksTarget(jodit: IJodit, nodeElm: Node, hadEffect: boolean): boolean;
@@ -0,0 +1,14 @@
1
+ /*!
2
+ * Jodit Editor (https://xdsoft.net/jodit/)
3
+ * Released under MIT see LICENSE.txt in the project root for license information.
4
+ * Copyright (c) 2013-2026 Valerii Chupurnov. All rights reserved. https://xdsoft.net
5
+ */
6
+ /**
7
+ * @module plugins/clean-html
8
+ */
9
+ import type { IJodit } from "../../../../../types/index";
10
+ /**
11
+ * Add `sandbox=""` attribute to all `<iframe>` elements in the editor content
12
+ * @private
13
+ */
14
+ export declare function sandboxIframesInContent(jodit: IJodit, nodeElm: Node, hadEffect: boolean): boolean;
@@ -0,0 +1,14 @@
1
+ /*!
2
+ * Jodit Editor (https://xdsoft.net/jodit/)
3
+ * Released under MIT see LICENSE.txt in the project root for license information.
4
+ * Copyright (c) 2013-2026 Valerii Chupurnov. All rights reserved. https://xdsoft.net
5
+ */
6
+ /**
7
+ * @module plugins/clean-html
8
+ */
9
+ import type { IJodit } from "../../../../../types/index";
10
+ /**
11
+ * Filter CSS properties in style attributes based on allowedStyles whitelist
12
+ * @private
13
+ */
14
+ export declare function sanitizeStyles(jodit: IJodit, nodeElm: Node, hadEffect: boolean): boolean;