CVE-2023-2317
moderate-risk
Published 2023-08-19
DOM-based XSS in updater/update.html in Typora before 1.6.7 on Windows and Linux allows a crafted markdown file to run arbitrary JavaScript code in the context of Typora main window via loading typora://app/typemark/updater/update.html in <embed> tag. This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.
Do I need to act?
!
49.3% chance of exploitation in next 30 days
EPSS score — higher than 51% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.6/10
High
LOCAL
/ LOW complexity
Affected Products (1)
Affected Vendors
References (4)
Vendor Advisory
https://support.typora.io/What's-New-1.6/
Vendor Advisory
https://support.typora.io/What's-New-1.6/
49
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
18/34 · Moderate
Exposure
5/34 · Minimal