{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T00:07:42.510","vulnerabilities":[{"cve":{"id":"CVE-2018-1000534","sourceIdentifier":"cve@mitre.org","published":"2018-06-26T16:29:01.947","lastModified":"2024-11-21T03:40:08.497","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Joplin version prior to 1.0.90 contains a XSS evolving into code execution due to enabled nodeIntegration for that particular BrowserWindow instance where XSS was identified from vulnerability in Note content field - information on the fix can be found here https://github.com/laurent22/joplin/commit/494e235e18659574f836f84fcf9f4d4fcdcfcf89 that can result in executing unauthorized code within the rights in which the application is running. This attack appear to be exploitable via Victim synchronizing notes from the cloud services or other note-keeping services which contain malicious code. This vulnerability appears to have been fixed in 1.0.90 and later."},{"lang":"es","value":"Joplin en versiones anteriores a la 1.0.90 contiene Cross-Site Scripting (XSS) que evoluciona a una ejecución de código debido a que se habilita nodeIntegration para esa instancia BrowserWindow en concreto en la que se identificó XSS a partir de la vulnerabilidad en el campo de contenido Note. La información sobre la solución se puede encontrar en https://github.com/laurent22/joplin/commit/494e235e18659574f836f84fcf9f4d4fcdcfcf89. Esto podría resultar en la ejecución de código no autorizado con los derechos en los que se ejecuta la aplicación. Este ataque parece ser explotable mediante una víctima que sincroniza notas desde los servicios cloud u otros servicios de guardado de notas que contienen código malicioso. La vulnerabilidad parece haber sido solucionada en las versiones 1.0.90 y siguientes."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.90","matchCriteriaId":"B661B315-948E-48F7-8A0B-ACB84D0DF32B"}]}]}],"references":[{"url":"https://github.com/laurent22/joplin/commit/494e235e18659574f836f84fcf9f4d4fcdcfcf89","source":"cve@mitre.org","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/laurent22/joplin/issues/500","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/laurent22/joplin/commit/494e235e18659574f836f84fcf9f4d4fcdcfcf89","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/laurent22/joplin/issues/500","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}