Joplin version 2.8.8 allows an external attacker to execute arbitrary commands remotely on any client that opens a link in a malicious markdown file, via Joplin. This is possible because the application does not properly validate the schema/protocol of existing links in the markdown file before passing them to the shell.openExternal function.
{
"github_reviewed_at": "2024-04-23T17:43:45Z",
"cwe_ids": [
"CWE-20"
],
"severity": "HIGH",
"github_reviewed": true,
"nvd_published_at": "2022-09-30T17:15:00Z"
}