You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Versions of the package markdown-to-jsx before 7.4.0 are vulnerable to Cross-site Scripting (XSS) via the src property due to improper input sanitization. An attacker can execute arbitrary code by injecting a malicious iframe element in the markdown.
mend-for-g.yxqyang.asiabot
changed the title
CVE-2024-21535 (Medium) detected in markdown-to-jsx-6.11.4.tgz
CVE-2024-21535 (Medium) detected in markdown-to-jsx-6.11.4.tgz - autoclosed
May 1, 2025
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
CVE-2024-21535 - Medium Severity Vulnerability
Convert markdown to JSX with ease for React and React-like projects. Super lightweight and highly configurable.
Library home page: https://registry.npmjs.org/markdown-to-jsx/-/markdown-to-jsx-6.11.4.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json
Dependency Hierarchy:
Found in HEAD commit: cba076465f44b6a819e3cff7986ff4cd21a66371
Found in base branch: main
Versions of the package markdown-to-jsx before 7.4.0 are vulnerable to Cross-site Scripting (XSS) via the src property due to improper input sanitization. An attacker can execute arbitrary code by injecting a malicious iframe element in the markdown.
Publish Date: 2024-10-15
URL: CVE-2024-21535
Base Score Metrics:
The text was updated successfully, but these errors were encountered: