CodiMD through 2.2.0 has a CSP-based protection mechanism against XSS through uploaded JavaScript content, but it can be bypassed by uploading a .html file that references an uploaded .js file.
References
| Link | Resource |
|---|---|
| https://github.com/hackmdio/codimd/issues/1910 | Exploit Issue Tracking |
| https://github.com/zast-ai/vulnerability-reports/blob/main/formidable/file_upload/report.md | Exploit Third Party Advisory |
| https://github.com/hackmdio/codimd/issues/1910 | Exploit Issue Tracking |
Configurations
History
No history.
Information
Published : 2025-04-26 21:15
Updated : 2025-08-05 15:14
NVD link : CVE-2025-46654
Mitre link : CVE-2025-46654
CVE.ORG link : CVE-2025-46654
JSON object : View
Products Affected
hackmd
- codimd
CWE
CWE-424
Improper Protection of Alternate Path
