Description
Joplin version prior to 1.0.90 contains a XSS evolving into code execution due to enabled nodeIntegration for that particular BrowserWindow instance where XSS was identified from vulnerability in Note content field - information on the fix can be found here https://github.com/laurent22/joplin/commit/494e235e18659574f836f84fcf9f4d4fcdcfcf89 that can result in executing unauthorized code within the rights in which the application is running. This attack appear to be exploitable via Victim synchronizing notes from the cloud services or other note-keeping services which contain malicious code. This vulnerability appears to have been fixed in 1.0.90 and later.
References (2)
Core 2
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/laurent22/joplin/issues/500
Patch, Third Party Advisory x_refsource_misc
https://github.com/laurent22/joplin/commit/494e235e18659574f836f84fcf9f4d4fcdcfcf89
Scores
CVSS v3
6.1
EPSS
0.0046
EPSS Percentile
64.2%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (2)
joplin_project/joplin
< 1.0.90
npm/joplin
0 - 1.0.90npm
Published
Jun 26, 2018
Tracked Since
Feb 18, 2026