Vulnerability DatabaseGHSA-9r27-994c-4xch

GHSA-9r27-994c-4xch
JavaScript vulnerability analysis and mitigation

Overview

A high-severity vulnerability was identified in the discord-markdown npm package (GHSA-9r27-994c-4xch) affecting versions prior to 2.3.1. The vulnerability was discovered and disclosed on February 20, 2020, where code blocks without language identifiers were not properly escaping HTML content, potentially allowing arbitrary HTML injection (GitHub Advisory).

Technical details

The vulnerability stems from the discord-markdown package's handling of code blocks that lack language identifiers. When processing these blocks, the package failed to properly sanitize HTML characters, allowing raw HTML to be rendered in the output. This issue specifically occurred in the HTML processing rules where code blocks without syntax highlighting were not passing through the sanitization function (GitHub Commit).

Impact

The vulnerability could allow attackers to inject arbitrary HTML code into websites that use discord-markdown to process user-generated markdown content. This creates a potential cross-site scripting (XSS) attack vector, where malicious users could execute unauthorized JavaScript or inject unwanted HTML content into the affected pages (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in version 2.3.1 of discord-markdown. For users unable to update immediately, a workaround is available by manually escaping the characters <, >, and & before sending plain code blocks to discord-markdown. Users are strongly encouraged to upgrade to version 2.3.1 or later to receive the security fix (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23947CRITICAL9.3
  • JavaScriptJavaScript
  • @orval/core
NoYesJan 20, 2026
CVE-2026-23950HIGH8.8
  • JavaScriptJavaScript
  • grafana-graphite
NoYesJan 20, 2026
CVE-2026-22037HIGH8.4
  • JavaScriptJavaScript
  • @fastify/express
NoYesJan 19, 2026
CVE-2026-23522LOW3.7
  • JavaScriptJavaScript
  • @lobehub/chat
NoNoJan 19, 2026
CVE-2025-66803LOW1.7
  • JavaScriptJavaScript
  • @hotwired/turbo
NoYesJan 20, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management