CVE-2023-29641
Description
Cross Site Scripting (XSS) vulnerability in pandao editor.md thru 1.5.0 allows attackers to inject arbitrary web script or HTML via crafted markdown text.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Editor.md prior to 1.5.0 allows stored cross-site scripting via crafted Markdown input due to insufficient sanitization, enabling arbitrary script execution.
Root
Cause CVE-2023-29641 describes a stored cross-site scripting (XSS) vulnerability in the pandao/editor.md open-source Markdown editor, affecting all versions through 1.5.0. The core issue is the absence of input sanitization on Markdown text; the library passes user-supplied content directly to the HTML rendering pipeline without stripping dangerous HTML tags or script attributes [1][3].
Exploitation
Method An attacker can inject arbitrary web script or HTML by embedding payloads inside Markdown constructs, such as an image tag with an onerror handler (e.g., )). Because Editor.md processes the Markdown client-side via CodeMirror and the Marked library, any crafted text entered in the editor or submitted via the editormd.markdownToHTML() function will be rendered unsafely [2]. Exploitation requires no authentication when the editor is exposed to untrusted users (e.g., in public comment forms or collaborative editing).
Impact
Successful exploitation enables an attacker to execute arbitrary JavaScript in the context of the victim's browser session, leading to session hijacking, defacement, theft of sensitive data, or phishing within the application's origin. The vulnerability is classified with CVSS 6.1 (Medium severity) due to the need for user interaction (viewing the rendered content) and the lack of a direct network-based attack vector [2].
Mitigation
The project's repository indicates the issue has been reported via GitHub issue #985; however, as of the disclosure date, the maintainer has not released a patched version [3]. Users must implement a workaround by sanitizing all Markdown input server-side before passing it to Editor.md, for example by stripping event-handler attributes and dangerous tags (`, `, etc.). Alternatively, migrating to a maintained fork or alternative Markdown editor is recommended.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
editor.mdnpm | <= 1.5.0 | — |
Affected products
2- pandao/editor.mddescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-847g-34c5-vvm8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-29641ghsaADVISORY
- github.com/pandao/editor.md/issues/985ghsaWEB
News mentions
0No linked articles in our index yet.