We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
CodiMD through 2.5.4 has a CSP-based protection mechanism against XSS through uploaded SVG documents containing JavaScript, but it can be bypassed in certain cases of different-origin file storage, such as AWS S3. NOTE: it can be considered a user error if AWS is employed for hosting untrusted JavaScript content, but the selected architecture within AWS does not have components that are able to insert Content-Security-Policy headers.
Reserved 2025-04-26 | Published 2025-04-26 | Updated 2025-04-29 | Assigner mitreCWE-424 Improper Protection of Alternate Path
github.com/hackmdio/codimd/issues/1910
github.com/...rts/blob/main/formidable/file_upload/report.md
Support options