Логотип exploitDog
bind:CVE-2022-25863
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-25863

Количество 2

Количество 2

nvd логотип

CVE-2022-25863

больше 3 лет назад

The package gatsby-plugin-mdx before 2.14.1, from 3.0.0 and before 3.15.2 are vulnerable to Deserialization of Untrusted Data when passing input through to the gray-matter package, due to its default configurations that are missing input sanitization. Exploiting this vulnerability is possible when passing input in both webpack (MDX files in src/pages or MDX file imported as a component in frontend / React code) and data mode (querying MDX nodes via GraphQL). Workaround: If an older version of gatsby-plugin-mdx must be used, input passed into the plugin should be sanitized ahead of processing.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-mj46-r4gr-5x83

больше 3 лет назад

Unsanitized JavaScript code injection possible in gatsby-plugin-mdx

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-25863

The package gatsby-plugin-mdx before 2.14.1, from 3.0.0 and before 3.15.2 are vulnerable to Deserialization of Untrusted Data when passing input through to the gray-matter package, due to its default configurations that are missing input sanitization. Exploiting this vulnerability is possible when passing input in both webpack (MDX files in src/pages or MDX file imported as a component in frontend / React code) and data mode (querying MDX nodes via GraphQL). Workaround: If an older version of gatsby-plugin-mdx must be used, input passed into the plugin should be sanitized ahead of processing.

CVSS3: 8.1
1%
Низкий
больше 3 лет назад
github логотип
GHSA-mj46-r4gr-5x83

Unsanitized JavaScript code injection possible in gatsby-plugin-mdx

CVSS3: 8.1
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу