Karakeep is a elf-hostable bookmark-everything app. In version 0.30.0, when the Reddit metascraper plugin returns `readableContentHtml`, the HTML parsing subprocess uses it directly without running it through DOMPurify. Every other content source in the crawler goes through Readability + DOMPurify, but the Reddit path skips both. Since this content ends up in `dangerouslySetInnerHTML` in the reader view, any malicious HTML in the Reddit response gets executed in the user's browser. Version 0.31.0 contains a patch for this issue.
References
| Link | Resource |
|---|---|
| https://github.com/karakeep-app/karakeep/commit/ba3db953c0d8675e2e3ecc29113a332b570b2cb9 | Patch |
| https://github.com/karakeep-app/karakeep/releases/tag/v0.31.0 | Product Release Notes |
| https://github.com/karakeep-app/karakeep/security/advisories/GHSA-mg93-f9mw-wpgj | Exploit Vendor Advisory |
Configurations
History
27 Feb 2026, 18:48
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:localhostlabs:karakeep:0.30.0:*:*:*:*:node.js:*:* | |
| References | () https://github.com/karakeep-app/karakeep/commit/ba3db953c0d8675e2e3ecc29113a332b570b2cb9 - Patch | |
| References | () https://github.com/karakeep-app/karakeep/releases/tag/v0.31.0 - Product, Release Notes | |
| References | () https://github.com/karakeep-app/karakeep/security/advisories/GHSA-mg93-f9mw-wpgj - Exploit, Vendor Advisory | |
| First Time |
Localhostlabs
Localhostlabs karakeep |
25 Feb 2026, 04:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-25 04:16
Updated : 2026-02-27 18:48
NVD link : CVE-2026-27627
Mitre link : CVE-2026-27627
CVE.ORG link : CVE-2026-27627
JSON object : View
Products Affected
localhostlabs
- karakeep
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
