The package joplin before 2.3.2 are vulnerable to Cross-site Request Forgery (CSRF) due to missing CSRF checks in various forms.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://snyk.io/vuln/SNYK-JS-JOPLIN-1325537 | third party advisory patch |
https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e | third party advisory patch |