Joplin is a free, open source note taking and to-do application. A Cross-site Scripting (XSS) vulnerability allows pasting untrusted data into the rich text editor to execute arbitrary code. HTML pasted into the rich text editor is not sanitized (or not sanitized properly). As such, the `onload` attribute of pasted images can execute arbitrary code. Because the TinyMCE editor frame does not use the `sandbox` attribute, such scripts can access NodeJS's `require` through the `top` variable. From this, an attacker can run arbitrary commands. This issue has been addressed in version 2.12.10 and users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Fri, 11 Apr 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Joplin Project
Joplin Project joplin
CPEs cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:*
Vendors & Products Joplin Project
Joplin Project joplin

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T17:46:55.757Z

Reserved: 2023-07-18T16:28:12.077Z

Link: CVE-2023-38506

cve-icon Vulnrichment

Updated: 2024-08-02T17:46:55.757Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-21T20:15:12.003

Modified: 2025-04-11T15:17:15.377

Link: CVE-2023-38506

cve-icon Redhat

No data.