Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-547r-qmjm-8hvw | md-to-pdf vulnerable to arbitrary JavaScript code execution when parsing front matter |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 24 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Simonhaenisch
Simonhaenisch md-to-pdf |
|
| Vendors & Products |
Simonhaenisch
Simonhaenisch md-to-pdf |
Fri, 21 Nov 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | md-to-pdf is a CLI tool for converting Markdown files to PDF using Node.js and headless Chrome. Prior to version 5.2.5, a Markdown front-matter block that contains JavaScript delimiter causes the JS engine in gray-matter library to execute arbitrary code in the Markdown to PDF converter process of md-to-pdf library, resulting in remote code execution. This issue has been patched in version 5.2.5. | |
| Title | md-to-pdf is vulnerable to arbitrary JavaScript code execution when parsing front matter | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-24T17:17:08.879Z
Reserved: 2025-11-17T20:55:34.694Z
Link: CVE-2025-65108
Updated: 2025-11-24T17:17:04.810Z
Status : Awaiting Analysis
Published: 2025-11-21T22:16:33.317
Modified: 2025-11-25T22:16:42.557
Link: CVE-2025-65108
No data.
OpenCVE Enrichment
Updated: 2025-11-24T09:08:10Z
Github GHSA