VYPR
Medium severity6.1NVD Advisory· Published Aug 13, 2025· Updated Apr 15, 2026

CVE-2025-51691

CVE-2025-51691

Description

Cross-Site Scripting (XSS) vulnerability found in MarkTwo commit e3a1d3f90cce4ea9c26efcbbf3a1cbfb9dcdb298 (May 2025) allows a remote attacker to execute arbitrary code via a crafted script input to the editor interface. The application does not properly sanitize user-supplied Markdown before rendering it. Successful exploitation could lead to session hijacking, credential theft, or arbitrary client-side code execution in the context of the victim's browser.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

MarkTwo Markdown Editor has a stored XSS flaw because unsanitized user input is rendered; remote attackers can run arbitrary JavaScript via crafted Markdown.

Root

Cause The vulnerability lies in MarkTwo markdown editor commit e3a1d3f90cce4ea9c26efcbbf3a1cbfb9dcdb298 (latest as of May 2025). The application fails to sanitize user-supplied Markdown before rendering it in the browser, allowing injection of arbitrary HTML/JavaScript. This is a classic cross-site scripting (XSS) weakness in the editor interface [1][2].

Exploitation

An attacker can craft a malicious Markdown document containing embedded `` tags or other XSS payloads. When a victim views the crafted document in MarkTwo, the browser executes the injected JavaScript in the context of the MarkTwo application. No authentication or special privileges are required: the attacker only needs to entice the victim to open the crafted content (e.g., via a shared link or by embedding the content in a comment) [2].

Impact

Successful exploitation enables session hijacking, credential theft, or arbitrary client-side code execution in the victim's browser. The attacker can steal cookies, access local storage, or redirect the victim to phishing pages, all within the security context of the MarkTwo application [1][2].

Mitigation

As of the disclosure date (August 2025), the advisory recommends updating to a patched version. Users should apply proper output encoding or use a Markdown parser that sanitizes dangerous HTML elements. No workaround is available beyond disabling the editor until a fix is deployed [2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Anthonygarvan/Marktworeferences2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)range: = e3a1d3f90cce4ea9c26efcbbf3a1cbfb9dcdb298

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.