Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. joplin
  4. ›
  5. CVE-2024-49362

CVE-2024-49362: Remote Code Execution on click of <a> Link in markdown preview

November 14, 2024 (updated January 30, 2025)

There is a vulnerability in Joplin-desktop that leads to remote code execution (RCE) when a user clicks on an <a> link within untrusted notes. The issue arises due to insufficient sanitization of <a> tag attributes introduced by the Mermaid. This vulnerability allows the execution of untrusted HTML content within the Electron window, which has full access to Node.js APIs, enabling arbitrary shell command execution.

References

  • github.com/advisories/GHSA-hff8-hjwv-j9q7
  • github.com/laurent22/joplin
  • github.com/laurent22/joplin/security/advisories/GHSA-hff8-hjwv-j9q7
  • nvd.nist.gov/vuln/detail/CVE-2024-49362

Code Behaviors & Features

Detect and mitigate CVE-2024-49362 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 3.0.0 before 3.1.0, version 3.0.0

Fixed versions

  • 3.1.0

Solution

Upgrade to version 3.1.0 or above.

Impact 7.7 HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L

Learn more about CVSS

Weakness

  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

npm/joplin/CVE-2024-49362.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:03 +0000.