{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T07:08:54.233","vulnerabilities":[{"cve":{"id":"CVE-2021-37700","sourceIdentifier":"security-advisories@github.com","published":"2021-08-12T21:15:09.173","lastModified":"2024-11-21T06:15:44.247","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"@github/paste-markdown is an npm package for pasting markdown objects. A self Cross-Site Scripting vulnerability exists in the @github/paste-markdown before version 0.3.4. If the clipboard data contains the string `<table>`, a **div** is dynamically created, and the clipboard content is copied into its **innerHTML** property without any sanitization, resulting in improper execution of JavaScript in the browser of the victim (the user who pasted the code). Users directed to copy text from a malicious website and paste it into pages that utilize this library are affected. This is fixed in version 0.3.4. Refer the to the referenced GitHub Advisory for more details including an example exploit."},{"lang":"es","value":"@github/paste-markdown es un paquete npm para pegar objetos markdown. Se presenta una vulnerabilidad de tipo Cross-Site Scripting en @github/paste-markdown versiones anteriores a 0.3.4. Si los datos del portapapeles contienen la cadena \"(table)\", se crea dinámicamente un **div**, y el contenido del portapapeles es copiado en su propiedad **innerHTML** sin ningún tipo de saneo, resultando en una ejecución inapropiada de JavaScript en el navegador de la víctima (el usuario que pegó el código). Están afectados los usuarios a los que se les indica que copien texto de un sitio web malicioso y lo peguen en páginas que usan esta biblioteca. Esto se ha corregido en la versión 0.3.4. Consulte el aviso de GitHub al que se hace referencia para obtener más detalles, incluido un ejemplo de explotación."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:paste-markdown_project:paste-markdown:*:*:*:*:*:node.js:*:*","versionEndExcluding":"0.3.4","matchCriteriaId":"8C011892-0763-45BB-B8AF-DAC9819E4861"}]}]}],"references":[{"url":"https://github.com/github/paste-markdown/commit/32b7ea3f29ae8f256f9d19768387be42678ddf30","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/github/paste-markdown/releases/tag/v0.3.4","source":"security-advisories@github.com","tags":["Release Notes","Third Party Advisory"]},{"url":"https://github.com/github/paste-markdown/security/advisories/GHSA-gpfj-4j6g-c4w9","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.npmjs.com/package/%40github/paste-markdown","source":"security-advisories@github.com"},{"url":"https://github.com/github/paste-markdown/commit/32b7ea3f29ae8f256f9d19768387be42678ddf30","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/github/paste-markdown/releases/tag/v0.3.4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Third Party Advisory"]},{"url":"https://github.com/github/paste-markdown/security/advisories/GHSA-gpfj-4j6g-c4w9","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.npmjs.com/package/%40github/paste-markdown","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}