CodiMD through 2.5.4 has a CSP-based protection mechanism against XSS through uploaded SVG documents containing JavaScript, but it can be bypassed in certain cases of different-origin file storage, such as AWS S3. NOTE: it can be considered a user error if AWS is employed for hosting untrusted JavaScript content, but the selected architecture within AWS does not have components that are able to insert Content-Security-Policy headers.
Metrics
Affected Vendors & Products
References
History
Tue, 29 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 26 Apr 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CodiMD through 2.5.4 has a CSP-based protection mechanism against XSS through uploaded SVG documents containing JavaScript, but it can be bypassed in certain cases of different-origin file storage, such as AWS S3. NOTE: it can be considered a user error if AWS is employed for hosting untrusted JavaScript content, but the selected architecture within AWS does not have components that are able to insert Content-Security-Policy headers. | |
| Weaknesses | CWE-424 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-04-26T00:00:00.000Z
Updated: 2025-04-29T15:22:43.429Z
Reserved: 2025-04-26T00:00:00.000Z
Link: CVE-2025-46655
Updated: 2025-04-29T14:06:04.315Z
Status : Awaiting Analysis
Published: 2025-04-26T21:15:15.260
Modified: 2025-04-29T16:15:37.440
Link: CVE-2025-46655
No data.