
Cloud Vulnerability DB
A community-led vulnerabilities database
A cross-site scripting (XSS) vulnerability has been identified in vnotex vnote versions up to 3.17.0, tracked as CVE-2023-5701. The vulnerability affects the Markdown File Handler component and can be exploited remotely. The issue was discovered and disclosed publicly, with the vendor being contacted but providing no response (NVD).
The vulnerability is classified as a cross-site scripting (XSS) issue with a CVSS v3.1 base score of 6.1 (MEDIUM) and vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The flaw exists in the Markdown File Handler component and can be triggered through user interaction with specially crafted content. Notably, the vulnerability can bypass XSS defense measures even when the highest security mode is enabled with 'protectfromxss:true' configuration (NVD, GitHub POC).
When exploited, this vulnerability allows attackers to execute cross-site scripting attacks, potentially leading to unauthorized access to sensitive information and manipulation of web content. The impact is particularly significant as it can bypass the application's built-in XSS protection mechanisms, even when configured at the highest security level (NVD).
At the time of disclosure, no official fixes have been provided by the vendor. The vendor was contacted about this vulnerability but did not respond to the disclosure (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."