CVE-2023-39584
JavaScript vulnerability analysis and mitigation

Overview

Hexo up to version 7.0.0 (RC2) contains an arbitrary file read vulnerability identified as CVE-2023-39584. The vulnerability was discovered in July 2023 and affects the include_code tag functionality in the Hexo blog framework. The issue impacts all versions of Hexo up to and including version 7.0.0 RC2 (NVD).

Technical details

The vulnerability exists in the include_code tag functionality where the security check intended to prevent directory traversal can be bypassed. While the code attempts to block paths containing '../', it fails to account for Windows-style directory traversal using backslashes ('..'), allowing attackers to bypass the protection mechanism. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N (NVD, GitHub Issue).

Impact

The vulnerability allows attackers to read arbitrary files on the system by exploiting the directory traversal weakness. On Windows systems, an attacker can use backslash-based paths (..) to traverse directories and access files outside the intended directory structure. While theoretically possible on Linux systems using '../' combinations, this has not been verified (GitHub Issue).

Mitigation and workarounds

Users should upgrade to a patched version of Hexo when available. As a temporary workaround, careful validation of paths used in include_code tags should be implemented, blocking both forward slash and backslash-based directory traversal attempts (NVD).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65959HIGH8.7
  • JavaScriptJavaScript
  • open-webui
NoYesDec 04, 2025
CVE-2025-66032HIGH8.7
  • JavaScriptJavaScript
  • @anthropic-ai/claude-code
NoYesDec 03, 2025
CVE-2025-65945HIGH7.5
  • JavaScriptJavaScript
  • jws
NoYesDec 04, 2025
CVE-2025-66404MEDIUM6.4
  • JavaScriptJavaScript
  • mcp-server-kubernetes
NoYesDec 03, 2025
CVE-2025-66479LOW1.8
  • JavaScriptJavaScript
  • @anthropic-ai/sandbox-runtime
NoYesDec 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management