GHSA-66ww-999q-mffq

Suggest an improvement
Source
https://github.com/advisories/GHSA-66ww-999q-mffq
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-66ww-999q-mffq/GHSA-66ww-999q-mffq.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-66ww-999q-mffq
Aliases
Published
2022-03-18T00:01:11Z
Modified
2024-09-03T04:11:57.849680Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Arbitrary code execution in post-loader
Details

post-loader is webpack loader for blog posts written in Markdown. The package post-loader from 0.0.0 is vulnerable to Arbitrary Code Execution which uses a markdown parser in an unsafe way so that any javascript code inside the markdown input files gets evaluated and executed. At this time, there is no known workaround or patch available.

References

Affected packages

npm / post-loader

Package

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0