CVE-2026-25642

HedgeDoc is an open source, real-time, collaborative, markdown notes application. Prior to 1.10.6, files served below the /uploads/ endpoint did not use a more strict security-policy. This resulted in a too open Content-Security-Policy and furthermore opened the possibility to host malicious interactive web content (such as fake login forms) using SVG files. This vulnerability is fixed in 1.10.6.
Configurations

Configuration 1 (hide)

cpe:2.3:a:hedgedoc:hedgedoc:*:*:*:*:*:*:*:*

History

25 Feb 2026, 14:45

Type Values Removed Values Added
CPE cpe:2.3:a:hedgedoc:hedgedoc:*:*:*:*:*:*:*:*
First Time Hedgedoc
Hedgedoc hedgedoc
References () https://github.com/hedgedoc/hedgedoc/commit/74daa0e7a1cbfafd9aeb255eaf064dfe47cd401c - () https://github.com/hedgedoc/hedgedoc/commit/74daa0e7a1cbfafd9aeb255eaf064dfe47cd401c - Patch
References () https://github.com/hedgedoc/hedgedoc/commit/b930fe04cee92cd4723044030bb59c36781c7137 - () https://github.com/hedgedoc/hedgedoc/commit/b930fe04cee92cd4723044030bb59c36781c7137 - Patch
References () https://github.com/hedgedoc/hedgedoc/releases/tag/1.10.6 - () https://github.com/hedgedoc/hedgedoc/releases/tag/1.10.6 - Product, Release Notes
References () https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-x74j-jmf9-534w - () https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-x74j-jmf9-534w - Patch, Vendor Advisory

06 Feb 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-06 20:16

Updated : 2026-02-25 14:45


NVD link : CVE-2026-25642

Mitre link : CVE-2026-25642

CVE.ORG link : CVE-2026-25642


JSON object : View

Products Affected

hedgedoc

  • hedgedoc
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')