A stored cross-site scripting vulnerability in marktext versions prior to v0.17.0 due to improper handling of the link (with javascript: scheme) inside the document may allow an attacker to execute an arbitrary script on the PC of the user using marktext.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/marktext/marktext/releases/tag/v0.17.0 | third party advisory release notes |
https://jvn.jp/en/jp/JVN89524240/index.html | vdb entry third party advisory |