CVE-2022-41710: Markdownify has Files or Directories Accessible to External Parties
5.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.05252%
CWE
Published
11/4/2022
Updated
2/2/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| electron-markdownify | npm | <= 1.4.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key issues: 1) Lack of input sanitization in markdown-to-HTML conversion allows arbitrary script execution (CWE-552 vector), and 2) Missing Electron security hardening measures (CSP + nodeIntegration settings) enables cross-platform filesystem access. While exact function names aren't visible in provided resources, Electron architecture patterns and the exploit's requirements make these components clearly vulnerable. The <img> onerror payload demonstration confirms renderer.process script execution capability, which would require both the markdown parser to allow unsafe HTML and the Electron context to permit Node.js filesystem access.