Joplin version 2.8.8 allows an external attacker to execute arbitrary commands remotely on any client that opens a link in a malicious markdown file, via Joplin. This is possible because the application does not properly validate the schema/protocol of existing links in the markdown file before passing them to the 'shell.openExternal' function.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 20 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Fluid Attacks

Published:

Updated: 2025-05-20T18:32:21.014Z

Reserved: 2022-09-08T00:00:00.000Z

Link: CVE-2022-40277

cve-icon Vulnrichment

Updated: 2024-08-03T12:14:40.043Z

cve-icon NVD

Status : Modified

Published: 2022-09-30T17:15:13.277

Modified: 2025-05-20T19:15:47.660

Link: CVE-2022-40277

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.