Cross-site Scripting (XSS)
Description
The package joyqi/hyper-down from 0.0.0 are vulnerable to Cross-site Scripting (XSS) because the module of parse markdown does not filter the href attribute very well.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
joyqi/hyper-down is vulnerable to stored XSS via crafted markdown links due to insufficient href filtering, with no fix available.
Vulnerability
Overview The joyqi/hyper-down package (also known as HyperDown) is a PHP Markdown parser vulnerable to Cross-site Scripting (XSS) because it fails to properly filter the href attribute in markdown links [1]. This allows attackers to inject javascript: URIs that execute arbitrary JavaScript when a user clicks the crafted link.
Exploitation
An attacker can supply markdown text such as `!. When parsed and rendered as HTML, the href` contains a javascript: URI that is not blocked. If a victim clicks the link, the script executes in their browser context [1]. No authentication is required; the attack vector is user interaction.
Impact
Successful exploitation leads to arbitrary JavaScript execution, potentially enabling session hijacking, credential theft, or defacement [2]. The vulnerability affects all versions of the package as no fix has been released.
Mitigation
As of the latest advisory, there is no patched version available [1]. Users should avoid using this library or implement custom filtering to sanitize href attributes. The source code is available on GitHub [3].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
joyqi/hyper-downPackagist | <= 2.4.27 | — |
Affected products
1- Range: <= 2.4.27
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.