CVE-2025-24028

Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. This vulnerability is caused by differences between how Joplin's HTML sanitizer handles comments and how the browser handles comments. This affects both the Rich Text Editor and the Markdown viewer. However, unlike the Rich Text Editor, the Markdown viewer is `cross-origin isolated`, which prevents JavaScript from directly accessing functions/variables in the toplevel Joplin `window`. This issue is not present in Joplin 3.1.24 and may have been introduced in `9b50539`. This is an XSS vulnerability that impacts users that open untrusted notes in the Rich Text Editor. This vulnerability has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:*

History

18 Apr 2025, 01:57

Type Values Removed Values Added
First Time Joplin Project
Joplin Project joplin
CPE cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:*
Summary
  • (es) Joplin es una aplicación de código abierto y gratuita para tomar notas y realizar tareas pendientes, que puede gestionar una gran cantidad de notas organizadas en cuadernos. Esta vulnerabilidad se debe a diferencias entre la forma en que el depurador HTML de Joplin gestiona los comentarios y la forma en que el navegador los gestiona. Esto afecta tanto al editor de texto enriquecido como al visor de Markdown. Sin embargo, a diferencia del editor de texto enriquecido, el visor de Markdown está "aislado en todos los orígenes", lo que impide que JavaScript acceda directamente a funciones o variables en la "ventana" de nivel superior de Joplin. Este problema no está presente en Joplin 3.1.24 y puede haberse introducido en "9b50539". Se trata de una vulnerabilidad XSS que afecta a los usuarios que abren notas que no son de confianza en el editor de texto enriquecido. Esta vulnerabilidad se ha solucionado en la versión 3.2.12 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad.
References () https://github.com/laurent22/joplin/commit/2a058ed8097c2502e152b26394dc1917897f5817 - () https://github.com/laurent22/joplin/commit/2a058ed8097c2502e152b26394dc1917897f5817 - Patch
References () https://github.com/laurent22/joplin/commit/9b505395918bc923f34fe6f3b960bb10e8cf234e - () https://github.com/laurent22/joplin/commit/9b505395918bc923f34fe6f3b960bb10e8cf234e - Patch
References () https://github.com/laurent22/joplin/security/advisories/GHSA-5w3c-wph9-hq92 - () https://github.com/laurent22/joplin/security/advisories/GHSA-5w3c-wph9-hq92 - Exploit, Vendor Advisory
References () https://joplinapp.org/help/dev/spec/note_viewer_isolation - () https://joplinapp.org/help/dev/spec/note_viewer_isolation - Product

10 Feb 2025, 18:15

Type Values Removed Values Added
References () https://github.com/laurent22/joplin/security/advisories/GHSA-5w3c-wph9-hq92 - () https://github.com/laurent22/joplin/security/advisories/GHSA-5w3c-wph9-hq92 -

07 Feb 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-07 23:15

Updated : 2025-04-18 01:57


NVD link : CVE-2025-24028

Mitre link : CVE-2025-24028

CVE.ORG link : CVE-2025-24028


JSON object : View

Products Affected

joplin_project

  • joplin
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')