CVE-2024-28246

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-28246
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-28246.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-28246
Aliases
Downstream
Published
2024-03-25T20:00:17Z
Modified
2025-10-14T14:33:20Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L CVSS Calculator
Summary
KaTeX is missing normalization of the protocol in URLs allows bypassing forbidden protocols
Details

KaTeX is a JavaScript library for TeX math rendering on the web. Code that uses KaTeX's trust option, specifically that provides a function to blacklist certain URL protocols, can be fooled by URLs in malicious inputs that use uppercase characters in the protocol. In particular, this can allow for malicious input to generate javascript: links in the output, even if the trust function tries to forbid this protocol via trust: (context) => context.protocol !== 'javascript'. Upgrade to KaTeX v0.16.10 to remove this vulnerability.

References

Affected packages

Git / github.com/KaTeX/KaTeX

Affected ranges

Type
GIT
Repo
https://github.com/KaTeX/KaTeX
Events