npm package
marked
pkg:npm/marked
Vulnerabilities (11)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-41680 | Hig | 7.5 | >= 18.0.0, < 18.0.2 | 18.0.2 | Apr 24, 2026 | Marked is a markdown parser and compiler. From 18.0.0 to 18.0.1, a critical Denial of Service (DoS) vulnerability exists in marked. By providing a specific 3-byte input sequence a tab, a vertical tab, and a newline (\x09\x0b\n)—an unauthenticated attacker can trigger an infinite | |
| CVE-2018-25110 | — | < 0.3.17 | 0.3.17 | May 23, 2025 | Marked prior to version 0.3.17 is vulnerable to a Regular Expression Denial of Service (ReDoS) attack due to catastrophic backtracking in several regular expressions used for parsing HTML tags and markdown links. An attacker can exploit this vulnerability by providing specially c | ||
| CVE-2022-21681 | — | < 4.0.10 | 4.0.10 | Jan 14, 2022 | Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of mark | ||
| CVE-2022-21680 | — | < 4.0.10 | 4.0.10 | Jan 14, 2022 | Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `block.def` may cause catastrophic backtracking against some strings and lead to a regular expression denial of service (ReDoS). Anyone who runs untrusted markdown through a vulnerable versi | ||
| CVE-2021-21306 | — | >= 1.1.1, < 2.0.0 | 2.0.0 | Feb 8, 2021 | Marked is an open-source markdown parser and compiler (npm package "marked"). In marked from version 1.1.1 and before version 2.0.0, there is a Regular expression Denial of Service vulnerability. This vulnerability can affect anyone who runs user generated code through marked. Th | ||
| CVE-2014-3743 | — | < 0.3.1 | 0.3.1 | Jan 6, 2020 | Multiple cross-site scripting (XSS) vulnerabilities in the Marked module before 0.3.1 for Node.js allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) gfm codeblocks (language) or (2) javascript url's. | ||
| CVE-2017-16114 | — | < 0.3.9 | 0.3.9 | Jun 7, 2018 | The marked module is vulnerable to a regular expression denial of service. Based on the information published in the public issue, 1k characters can block for around 6 seconds. | ||
| CVE-2016-10531 | — | < 0.3.6 | 0.3.6 | May 31, 2018 | marked is an application that is meant to parse and compile markdown. Due to the way that marked 0.3.5 and earlier parses input, specifically HTML entities, it's possible to bypass marked's content injection protection (`sanitize: true`) to inject a `javascript:` URL. This flaw e | ||
| CVE-2017-1000427 | — | < 0.3.7 | 0.3.7 | Jan 2, 2018 | marked version 0.3.6 and earlier is vulnerable to an XSS attack in the data: URI parser. | ||
| CVE-2015-8854 | Hig | 7.5 | < 0.3.4 | 0.3.4 | Jan 23, 2017 | The marked package before 0.3.4 for Node.js allows attackers to cause a denial of service (CPU consumption) via unspecified vectors that trigger a "catastrophic backtracking issue for the em inline rule," aka a "regular expression denial of service (ReDoS)." | |
| CVE-2015-1370 | — | < 0.3.3 | 0.3.3 | Jan 27, 2015 | Incomplete blacklist vulnerability in marked 0.3.2 and earlier for Node.js allows remote attackers to conduct cross-site scripting (XSS) attacks via a vbscript tag in a link. |
- affected >= 18.0.0, < 18.0.2fixed 18.0.2
Marked is a markdown parser and compiler. From 18.0.0 to 18.0.1, a critical Denial of Service (DoS) vulnerability exists in marked. By providing a specific 3-byte input sequence a tab, a vertical tab, and a newline (\x09\x0b\n)—an unauthenticated attacker can trigger an infinite
- CVE-2018-25110May 23, 2025affected < 0.3.17fixed 0.3.17
Marked prior to version 0.3.17 is vulnerable to a Regular Expression Denial of Service (ReDoS) attack due to catastrophic backtracking in several regular expressions used for parsing HTML tags and markdown links. An attacker can exploit this vulnerability by providing specially c
- CVE-2022-21681Jan 14, 2022affected < 4.0.10fixed 4.0.10
Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of mark
- CVE-2022-21680Jan 14, 2022affected < 4.0.10fixed 4.0.10
Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `block.def` may cause catastrophic backtracking against some strings and lead to a regular expression denial of service (ReDoS). Anyone who runs untrusted markdown through a vulnerable versi
- CVE-2021-21306Feb 8, 2021affected >= 1.1.1, < 2.0.0fixed 2.0.0
Marked is an open-source markdown parser and compiler (npm package "marked"). In marked from version 1.1.1 and before version 2.0.0, there is a Regular expression Denial of Service vulnerability. This vulnerability can affect anyone who runs user generated code through marked. Th
- CVE-2014-3743Jan 6, 2020affected < 0.3.1fixed 0.3.1
Multiple cross-site scripting (XSS) vulnerabilities in the Marked module before 0.3.1 for Node.js allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) gfm codeblocks (language) or (2) javascript url's.
- CVE-2017-16114Jun 7, 2018affected < 0.3.9fixed 0.3.9
The marked module is vulnerable to a regular expression denial of service. Based on the information published in the public issue, 1k characters can block for around 6 seconds.
- CVE-2016-10531May 31, 2018affected < 0.3.6fixed 0.3.6
marked is an application that is meant to parse and compile markdown. Due to the way that marked 0.3.5 and earlier parses input, specifically HTML entities, it's possible to bypass marked's content injection protection (`sanitize: true`) to inject a `javascript:` URL. This flaw e
- CVE-2017-1000427Jan 2, 2018affected < 0.3.7fixed 0.3.7
marked version 0.3.6 and earlier is vulnerable to an XSS attack in the data: URI parser.
- affected < 0.3.4fixed 0.3.4
The marked package before 0.3.4 for Node.js allows attackers to cause a denial of service (CPU consumption) via unspecified vectors that trigger a "catastrophic backtracking issue for the em inline rule," aka a "regular expression denial of service (ReDoS)."
- CVE-2015-1370Jan 27, 2015affected < 0.3.3fixed 0.3.3
Incomplete blacklist vulnerability in marked 0.3.2 and earlier for Node.js allows remote attackers to conduct cross-site scripting (XSS) attacks via a vbscript tag in a link.