CVE-2024-34449: Vditor allows Cross-site Scripting via an attribute of an `A` element
N/A
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.22911%
CWE
Published
5/3/2024
Updated
5/3/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS metrics data is empty
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| vditor | npm | = 3.10.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper sanitization of <a> element attributes during Markdown-to-HTML conversion. Key evidence includes: 1) Vendor's mitigation instruction to use 'sanitize=true' implies default unsafe configuration 2) CWE-79 classification confirms XSS via unneutralized web output 3) The preview feature's Markdown processing pipeline (options.preview.markdown.sanitize) is directly referenced in advisory links 4) Anchor tag handling is specifically called out in the vulnerability title. While exact code isn't shown, the configuration option and Lute engine's sanitization are central to the attack vector.