Home

Description

Markdown Explorer 0.1.1 contains a cross-site scripting vulnerability that allows attackers to inject malicious code through file uploads and editor inputs. Attackers can upload markdown files with embedded JavaScript payloads to execute remote commands and potentially gain system access.

PUBLISHED Reserved 2026-01-14 | Published 2026-01-16 | Updated 2026-01-16 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

0.1.1
affected

Credits

TaurusOmar finder

References

www.vulncheck.com/...xplorer-persistent-cross-site-scripting exploit

www.exploit-db.com/exploits/49826 (ExploitDB-49826) exploit

github.com/jersou/markdown-explorer (Markdown Explorer GitHub Repository) product

imgur.com/a/w4bcPWs (Proof of Concept Video) exploit

www.vulncheck.com/...xplorer-persistent-cross-site-scripting (VulnCheck Advisory: Markdown Explorer 0.1.1 - Persistent Cross-Site Scripting) third-party-advisory

cve.org (CVE-2021-47836)

nvd.nist.gov (CVE-2021-47836)

Download JSON