First published: Thu Mar 10 2022(Updated: )
A stored cross-site scripting vulnerability in marktext versions prior to v0.17.0 due to improper handling of the link (with javascript: scheme) inside the document may allow an attacker to execute an arbitrary script on the PC of the user using marktext.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Marktext Marktext | <0.17.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-21158 is medium, with a severity value of 5.4.
CVE-2022-21158 affects marktext versions prior to v0.17.0.
The CWE category of CVE-2022-21158 is CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
To fix CVE-2022-21158, update marktext to version v0.17.0 or later.
You can find more information about CVE-2022-21158 on the following references: [GitHub Release](https://github.com/marktext/marktext/releases/tag/v0.17.0) and [JVN](https://jvn.jp/en/jp/JVN89524240/index.html).