docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page.
{ "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "nvd_published_at": "2020-07-20T16:15:00Z", "github_reviewed_at": "2021-05-10T21:00:22Z", "github_reviewed": true }