Description
Joplin version 2.8.8 allows an external attacker to execute arbitrary commands remotely on any client that opens a link in a malicious markdown file, via Joplin. This is possible because the application does not properly validate the schema/protocol of existing links in the markdown file before passing them to the 'shell.openExternal' function.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7131 | Joplin version 2.8.8 allows an external attacker to execute arbitrary commands remotely on any client that opens a link in a malicious markdown file, via Joplin. This is possible because the application does not properly validate the schema/protocol of existing links in the markdown file before passing them to the 'shell.openExternal' function. |
Github GHSA |
GHSA-mjr5-v9c9-mm7g | Joplin Remote Code Execution |
References
History
Tue, 20 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2025-05-20T18:32:21.014Z
Reserved: 2022-09-08T00:00:00.000Z
Link: CVE-2022-40277
Updated: 2024-08-03T12:14:40.043Z
Status : Modified
Published: 2022-09-30T17:15:13.277
Modified: 2025-05-20T19:15:47.660
Link: CVE-2022-40277
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA