{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T20:48:12.027","vulnerabilities":[{"cve":{"id":"CVE-2021-39175","sourceIdentifier":"security-advisories@github.com","published":"2021-08-30T21:15:09.523","lastModified":"2024-11-21T06:18:47.743","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HedgeDoc is a platform to write and share markdown. In versions prior to 1.9.0, an unauthenticated attacker can inject arbitrary JavaScript into the speaker-notes of the slide-mode feature by embedding an iframe hosting the malicious code into the slides or by embedding the HedgeDoc instance into another page. The problem is patched in version 1.9.0. There are no known workarounds aside from upgrading."},{"lang":"es","value":"HedgeDoc es una plataforma para escribir y compartir markdown. En versiones anteriores a1.9.0, un atacante no autenticado puede inyectar JavaScript arbitrario en las notas de los oradores de la función de modo de diapositivas al insertar un iframe que aloje el código malicioso en las diapositivas o al insertar la instancia de HedgeDoc en otra página. El problema está parcheado en versión 1.9.0. No se conocen soluciones aparte de la actualización."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-74"},{"lang":"en","value":"CWE-346"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hedgedoc:hedgedoc:*:*:*:*:*:*:*:*","versionEndExcluding":"1.9.0","matchCriteriaId":"81394535-06A5-4A99-A7B6-8A7DB22B56C5"}]}]}],"references":[{"url":"https://github.com/hedgedoc/hedgedoc/pull/1369","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/hedgedoc/hedgedoc/pull/1375","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/hedgedoc/hedgedoc/pull/1513","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-j748-779h-9697","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/hedgedoc/hedgedoc/pull/1369","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/hedgedoc/hedgedoc/pull/1375","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/hedgedoc/hedgedoc/pull/1513","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-j748-779h-9697","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]}]}}]}