CVE-2025-46655

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-46655
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-46655.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-46655
Withdrawn
2025-04-26T20:38:04Z
Published
2025-04-26T21:15:15Z
Modified
2025-04-29T16:53:55.400408Z
Summary
[none]
Details

CodiMD through 2.5.4 has a CSP-based protection mechanism against XSS through uploaded SVG documents containing JavaScript, but it can be bypassed in certain cases of different-origin file storage, such as AWS S3. NOTE: it can be considered a user error if AWS is employed for hosting untrusted JavaScript content, but the selected architecture within AWS does not have components that are able to insert Content-Security-Policy headers.

References

Affected packages

Git / github.com/hackmdio/codimd

Affected ranges

Type
GIT
Repo
https://github.com/hackmdio/codimd
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

0.*

0.4.0
0.4.1
0.4.2
0.4.3
0.4.4
0.4.5
0.4.6
0.5.0

1.*

1.0.0-ce
1.0.1-ce
1.1.0-ce
1.1.1-ce
1.2.0
1.2.1
1.3.0
1.3.1
1.4.0
1.4.0-rc.1
1.4.0-rc.2
1.4.1
1.4.1-rc.1

2.*

2.0.0
2.0.0-rc.1
2.0.1
2.0.1-rc.1
2.1.0
2.2.0
2.3.0
2.3.1
2.3.2
2.4.0
2.4.1
2.4.2
2.5.0
2.5.1
2.5.2
2.5.3
2.5.4

v0.*

v0.3.3
v0.3.4