Markdownify version 1.4.1 allows an external attacker to execute arbitrary code remotely on any client attempting to view a malicious markdown file through Markdownify. This is possible because the application has the "nodeIntegration" option enabled.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-7076 Markdownify subject to Remote Code Execution via malicious markdown file
Github GHSA Github GHSA GHSA-c942-mfmp-p4fh Markdownify subject to Remote Code Execution via malicious markdown file
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0004}

epss

{'score': 0.00047}


Thu, 08 May 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-829
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Fluid Attacks

Published:

Updated: 2025-05-08T20:04:07.255Z

Reserved: 2022-09-28T00:00:00.000Z

Link: CVE-2022-41709

cve-icon Vulnrichment

Updated: 2024-08-03T12:49:43.875Z

cve-icon NVD

Status : Modified

Published: 2022-10-19T17:15:09.653

Modified: 2025-05-08T20:15:21.767

Link: CVE-2022-41709

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.