CodiMD through 2.5.4 has a CSP-based protection mechanism against XSS through uploaded SVG documents containing JavaScript, but it can be bypassed in certain cases of different-origin file storage, such as AWS S3. NOTE: it can be considered a user error if AWS is employed for hosting untrusted JavaScript content, but the selected architecture within AWS does not have components that are able to insert Content-Security-Policy headers.
History

Tue, 29 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 26 Apr 2025 20:45:00 +0000

Type Values Removed Values Added
Description CodiMD through 2.5.4 has a CSP-based protection mechanism against XSS through uploaded SVG documents containing JavaScript, but it can be bypassed in certain cases of different-origin file storage, such as AWS S3. NOTE: it can be considered a user error if AWS is employed for hosting untrusted JavaScript content, but the selected architecture within AWS does not have components that are able to insert Content-Security-Policy headers.
Weaknesses CWE-424
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-04-26T00:00:00.000Z

Updated: 2025-04-29T15:22:43.429Z

Reserved: 2025-04-26T00:00:00.000Z

Link: CVE-2025-46655

cve-icon Vulnrichment

Updated: 2025-04-29T14:06:04.315Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-26T21:15:15.260

Modified: 2025-04-29T16:15:37.440

Link: CVE-2025-46655

cve-icon Redhat

No data.