CodiMD through 2.5.4 has a CSP-based protection mechanism against XSS through uploaded SVG documents containing JavaScript, but it can be bypassed in certain cases of different-origin file storage, such as AWS S3. NOTE: it can be considered a user error if AWS is employed for hosting untrusted JavaScript content, but the selected architecture within AWS does not have components that are able to insert Content-Security-Policy headers.
References
Configurations
No configuration.
History
29 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/hackmdio/codimd/issues/1910 - |
29 Apr 2025, 13:52
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 Apr 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-26 21:15
Updated : 2025-04-29 16:15
NVD link : CVE-2025-46655
Mitre link : CVE-2025-46655
CVE.ORG link : CVE-2025-46655
JSON object : View
Products Affected
No product.
CWE
CWE-424
Improper Protection of Alternate Path