CVE-2023-45673

Joplin is a free, open source note taking and to-do application. A remote code execution (RCE) vulnerability in affected versions allows clicking on a link in a PDF in an untrusted note to execute arbitrary shell commands. Clicking links in PDFs allows for arbitrary code execution because Joplin desktop: 1. has not disabled top redirection for note viewer iframes, and 2. and has node integration enabled. This is a remote code execution vulnerability that impacts anyone who attaches untrusted PDFs to notes and has the icon enabled. This issue has been addressed in version 2.13.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:*

History

11 Apr 2025, 15:17

Type Values Removed Values Added
References () https://developer.mozilla.org/en-US/docs/Web/HTML/Element/iframe#sandbox - () https://developer.mozilla.org/en-US/docs/Web/HTML/Element/iframe#sandbox - Technical Description
References () https://github.com/laurent22/joplin/security/advisories/GHSA-g8qx-5vcm-3x59 - () https://github.com/laurent22/joplin/security/advisories/GHSA-g8qx-5vcm-3x59 - Exploit, Vendor Advisory
First Time Joplin Project joplin
Joplin Project
CPE cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:*
CWE CWE-94
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.0

21 Jun 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-21 20:15

Updated : 2025-04-11 15:17


NVD link : CVE-2023-45673

Mitre link : CVE-2023-45673


JSON object : View

Products Affected

joplin_project

  • joplin
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')