Description
CodiMD through 2.5.4 has a CSP-based protection mechanism against XSS through uploaded SVG documents containing JavaScript, but it can be bypassed in certain cases of different-origin file storage, such as AWS S3. NOTE: it can be considered a user error if AWS is employed for hosting untrusted JavaScript content, but the selected architecture within AWS does not have components that are able to insert Content-Security-Policy headers.
References (2)
Core 2
Core References
Various Sources
https://github.com/zast-ai/vulnerability-reports/blob/main/formidable/file_upload/report.md
Issue Tracking
https://github.com/hackmdio/codimd/issues/1910
Scores
CVSS v3
4.9
EPSS
0.0015
EPSS Percentile
35.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-424
Status
published
Products (1)
HackMD/CodiMD
< 2.5.4
Published
Apr 26, 2025
Tracked Since
Feb 18, 2026