Joplin is an open source, privacy-focused note taking app with sync capabilities for Windows, macOS, Linux, Android and iOS. In affected versions attackers are able to abuse the fact that openExternal is used without any filtering of URI schemes to obtain remote code execution in Windows environments. This issue has been addressed in version 3.0.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-50521 | Joplin is an open source, privacy-focused note taking app with sync capabilities for Windows, macOS, Linux, Android and iOS. In affected versions attackers are able to abuse the fact that openExternal is used without any filtering of URI schemes to obtain remote code execution in Windows environments. This issue has been addressed in version 3.0.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 07 May 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Joplin Project
Joplin Project joplin |
|
| CPEs | cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:* | |
| Vendors & Products |
Joplin Project
Joplin Project joplin |
Mon, 25 Nov 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Laurent 22
Laurent 22 joplin |
|
| CPEs | cpe:2.3:a:laurent_22:joplin:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Laurent 22
Laurent 22 joplin |
|
| Metrics |
ssvc
|
Mon, 25 Nov 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Joplin is an open source, privacy-focused note taking app with sync capabilities for Windows, macOS, Linux, Android and iOS. In affected versions attackers are able to abuse the fact that openExternal is used without any filtering of URI schemes to obtain remote code execution in Windows environments. This issue has been addressed in version 3.0.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | |
| Title | Lack of validation on openExternal allows 1 click remote code execution in joplin | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-11-25T19:38:18.292Z
Reserved: 2024-11-19T20:08:14.481Z
Link: CVE-2024-53268
Updated: 2024-11-25T19:36:53.503Z
Status : Analyzed
Published: 2024-11-25T20:15:10.583
Modified: 2025-05-07T00:13:36.540
Link: CVE-2024-53268
No data.
OpenCVE Enrichment
No data.
EUVD