
Cloud Vulnerability DB
A community-led vulnerabilities database
Joplin version 2.8.8 and earlier versions were found to contain a Cross-Site Scripting (XSS) vulnerability that could lead to Remote Code Execution (RCE). The vulnerability, identified as CVE-2022-35131, was discovered in June 2022 and allows attackers to execute arbitrary commands by injecting crafted payloads into Node titles (CVE Details, GitHub Release).
The vulnerability exists due to improper input validation in the GotoAnything.tsx component at line 509, where dangerouslySetInnerHTML is used with unescaped user input. The issue can be triggered when searching for content using Ctrl+P, where the malicious payload in the note title is executed when shown in search results. The vulnerability affects both Windows and Linux operating systems (GitHub POC).
The vulnerability allows attackers to achieve remote code execution on affected systems through maliciously crafted note titles. The impact is particularly severe as the exploit can be triggered through notebook sharing, potentially affecting multiple users (GitHub POC).
The vulnerability was patched in Joplin version 2.9.1 by implementing proper input escaping. Users are advised to upgrade to this version or later to protect against this security issue (GitHub Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."