Vulnerability Description
Markdownify version 1.4.1 allows an external attacker to execute arbitrary code remotely on any client attempting to view a malicious markdown file through Markdownify. This is possible because the application has the "nodeIntegration" option enabled.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Markdownify Project | Markdownify | 1.4.1 |
Related Weaknesses (CWE)
References
- https://fluidattacks.com/advisories/adams/ExploitThird Party Advisory
- https://github.com/amitmerchant1990/electron-markdownifyThird Party Advisory
- https://fluidattacks.com/advisories/adams/ExploitThird Party Advisory
- https://github.com/amitmerchant1990/electron-markdownifyThird Party Advisory
FAQ
What is CVE-2022-41709?
CVE-2022-41709 is a vulnerability with a CVSS score of 7.8 (HIGH). Markdownify version 1.4.1 allows an external attacker to execute arbitrary code remotely on any client attempting to view a malicious markdown file through Markdownify. This is possible because the ap...
How severe is CVE-2022-41709?
CVE-2022-41709 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-41709?
Check the references section above for vendor advisories and patch information. Affected products include: Markdownify Project Markdownify.