Joplin is a free, open source note taking and to-do application. Joplin-desktop has a vulnerability that leads to remote code execution (RCE) when a user clicks on an <a> link within untrusted notes. The issue arises due to insufficient sanitization of <a> tag attributes introduced by the Mermaid. This vulnerability allows the execution of untrusted HTML content within the Electron window, which has full access to Node.js APIs, enabling arbitrary shell command execution.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-3261 Joplin is a free, open source note taking and to-do application. Joplin-desktop has a vulnerability that leads to remote code execution (RCE) when a user clicks on an <a> link within untrusted notes. The issue arises due to insufficient sanitization of <a> tag attributes introduced by the Mermaid. This vulnerability allows the execution of untrusted HTML content within the Electron window, which has full access to Node.js APIs, enabling arbitrary shell command execution.
Github GHSA Github GHSA GHSA-hff8-hjwv-j9q7 Remote Code Execution on click of <a> Link in markdown preview
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 07 May 2025 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Joplin Project
Joplin Project joplin
Weaknesses CWE-79
CPEs cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:*
Vendors & Products Joplin Project
Joplin Project joplin

Thu, 14 Nov 2024 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Joplinapp
Joplinapp joplin
CPEs cpe:2.3:a:joplinapp:joplin:*:*:*:*:*:node.js:*:*
Vendors & Products Joplinapp
Joplinapp joplin
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 Nov 2024 17:45:00 +0000

Type Values Removed Values Added
Description Joplin is a free, open source note taking and to-do application. Joplin-desktop has a vulnerability that leads to remote code execution (RCE) when a user clicks on an <a> link within untrusted notes. The issue arises due to insufficient sanitization of <a> tag attributes introduced by the Mermaid. This vulnerability allows the execution of untrusted HTML content within the Electron window, which has full access to Node.js APIs, enabling arbitrary shell command execution.
Title Remote Code Execution on click of <a> Link in markdown preview
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-11-14T21:39:43.794Z

Reserved: 2024-10-14T13:56:34.810Z

Link: CVE-2024-49362

cve-icon Vulnrichment

Updated: 2024-11-14T21:39:38.922Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-14T18:15:19.243

Modified: 2025-05-07T14:10:19.787

Link: CVE-2024-49362

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.