First published: Fri Feb 07 2025(Updated: )
Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. This vulnerability is caused by differences between how Joplin's HTML sanitizer handles comments and how the browser handles comments. This affects both the Rich Text Editor and the Markdown viewer. However, unlike the Rich Text Editor, the Markdown viewer is `cross-origin isolated`, which prevents JavaScript from directly accessing functions/variables in the toplevel Joplin `window`. This issue is not present in Joplin 3.1.24 and may have been introduced in `9b50539`. This is an XSS vulnerability that impacts users that open untrusted notes in the Rich Text Editor. This vulnerability has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Joplin | >3.1.24<3.2.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24028 has been classified with a medium severity level.
To fix CVE-2025-24028, you should update Joplin to version 3.2.12 or later.
CVE-2025-24028 affects Joplin versions from 3.1.24 up to, but not including, 3.2.12.
CVE-2025-24028 can lead to a potential security risk due to improper handling of HTML comments.
Currently, the best way to mitigate the risk of CVE-2025-24028 is to apply the latest updates as there are no effective workarounds.