Description
MDC is a tool to take regular Markdown and write documents interacting deeply with a Vue component. Prior to version 0.17.2, a remote script-inclusion / stored cross-site scripting vulnerability in @nuxtjs/mdc lets a Markdown author inject a `<base href="https://attacker.tld">` element. The `<base>` tag rewrites how all subsequent relative URLs are resolved, so an attacker can make the page load scripts, styles, or images from an external, attacker-controlled origin and execute arbitrary JavaScript in the site’s context. Version 0.17.2 contains a fix for the issue.
References (2)
Core 2
Core References
Vendor Advisory x_refsource_confirm
https://github.com/nuxt-modules/mdc/security/advisories/GHSA-cj6r-rrr9-fg82
Scores
CVSS v3
8.3
EPSS
0.0009
EPSS Percentile
25.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (2)
nuxt-modules/mdc
< 0.17.2
nuxtjs/mdc
0 - 0.17.2npm
Published
Jul 18, 2025
Tracked Since
Feb 18, 2026