Home

Description

Markdownify 1.2.0 contains a persistent cross-site scripting vulnerability that allows attackers to store malicious payloads within markdown files. Attackers can upload crafted markdown files with embedded scripts that execute when the file is opened, potentially enabling remote code execution.

PUBLISHED Reserved 2026-01-14 | Published 2026-01-16 | Updated 2026-01-16 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

1.2.0
affected

Credits

TaurusOmar finder

References

www.vulncheck.com/...downify-persistent-cross-site-scripting exploit

www.exploit-db.com/exploits/49835 (ExploitDB-49835) exploit

github.com/amitmerchant1990/electron-markdownify (Markdownify GitHub Repository) product

imgur.com/a/T4jBoiS (Proof of Concept Video) exploit

www.vulncheck.com/...downify-persistent-cross-site-scripting (VulnCheck Advisory: Markdownify 1.2.0 - Persistent Cross-Site Scripting) third-party-advisory

cve.org (CVE-2021-47837)

nvd.nist.gov (CVE-2021-47837)

Download JSON