Description
CoCalc is web-based software that enables collaboration in research, teaching, and scientific publishing. In affected versions the markdown parser allows `<script>` tags to be included which execute when published. This issue has been addressed in commit `419862a9c9879c`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References (2)
Core 2
Core References
Vendor Advisory x_refsource_confirm
https://github.com/sagemathinc/cocalc/security/advisories/GHSA-8w44-hggw-p5rf
Patch x_refsource_misc
https://github.com/sagemathinc/cocalc/commit/419862a9c9879c
Scores
CVSS v3
7.6
EPSS
0.0020
EPSS Percentile
42.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-79
Status
published
Products (1)
sagemathinc/cocalc
< 419862a9c9879c
Published
May 28, 2024
Tracked Since
Feb 18, 2026