CodiMD through 2.2.0 has a CSP-based protection mechanism against XSS through uploaded JavaScript content, but it can be bypassed by uploading a .html file that references an uploaded .js file.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://github.com/hackmdio/codimd/issues/1910 | Exploit Issue Tracking |
https://github.com/hackmdio/codimd/issues/1910 | Exploit Issue Tracking |
https://github.com/zast-ai/vulnerability-reports/blob/main/formidable/file_upload/report.md | Exploit Third Party Advisory |
Configurations
History
05 Aug 2025, 15:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:hackmd:codimd:*:*:*:*:*:*:*:* | |
First Time |
Hackmd codimd
Hackmd |
16 Jun 2025, 21:00
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:hackmdio:codimd:*:*:*:*:*:*:*:* | |
First Time |
Hackmdio codimd
Hackmdio |
|
References | () https://github.com/zast-ai/vulnerability-reports/blob/main/formidable/file_upload/report.md - Exploit, Third Party Advisory | |
References | () https://github.com/hackmdio/codimd/issues/1910 - Exploit, Issue Tracking |
26 Apr 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-26 21:15
Updated : 2025-08-05 15:14
NVD link : CVE-2025-46654
Mitre link : CVE-2025-46654
JSON object : View
Products Affected
hackmd
- codimd
CWE
No CWE.