Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Joplin's HTML sanitizer allows the `name` attribute to be specified. If `name` is set to the same value as an existing `document` property (e.g. `querySelector`), that property is replaced with the element. This vulnerability's only known impact is denial of service. The note viewer fails to refresh until closed and re-opened with a different note. This issue has been addressed in version 3.2.8 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Fri, 18 Apr 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Joplin Project
Joplin Project joplin |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:* | |
Vendors & Products |
Joplin Project
Joplin Project joplin |
Mon, 10 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 07 Feb 2025 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Joplin's HTML sanitizer allows the `name` attribute to be specified. If `name` is set to the same value as an existing `document` property (e.g. `querySelector`), that property is replaced with the element. This vulnerability's only known impact is denial of service. The note viewer fails to refresh until closed and re-opened with a different note. This issue has been addressed in version 3.2.8 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | |
Title | DOM Clobbering leads to temporary DOS in the note viewer in Joplin | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-10T17:18:47.395Z
Reserved: 2024-12-09T17:48:05.557Z
Link: CVE-2024-55630

Updated: 2025-02-10T17:18:41.789Z

Status : Analyzed
Published: 2025-02-07T23:15:13.293
Modified: 2025-04-18T02:10:01.963
Link: CVE-2024-55630

No data.