CodiMD through 2.5.4 has a CSP-based protection mechanism against XSS through uploaded SVG documents containing JavaScript, but it can be bypassed in certain cases of different-origin file storage, such as AWS S3. NOTE: it can be considered a user error if AWS is employed for hosting untrusted JavaScript content, but the selected architecture within AWS does not have components that are able to insert Content-Security-Policy headers.
Metrics
Affected Vendors & Products
References
History
Tue, 29 Apr 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 26 Apr 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | CodiMD through 2.5.4 has a CSP-based protection mechanism against XSS through uploaded SVG documents containing JavaScript, but it can be bypassed in certain cases of different-origin file storage, such as AWS S3. NOTE: it can be considered a user error if AWS is employed for hosting untrusted JavaScript content, but the selected architecture within AWS does not have components that are able to insert Content-Security-Policy headers. | |
Weaknesses | CWE-424 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-04-26T00:00:00.000Z
Updated: 2025-04-29T15:22:43.429Z
Reserved: 2025-04-26T00:00:00.000Z
Link: CVE-2025-46655

Updated: 2025-04-29T14:06:04.315Z

Status : Awaiting Analysis
Published: 2025-04-26T21:15:15.260
Modified: 2025-04-29T16:15:37.440
Link: CVE-2025-46655

No data.