Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-0835: Server Side XSS in markdown-pdf

0
High
VulnerabilityCVE-2023-0835cvecve-2023-0835
Published: Tue Apr 04 2023 (04/04/2023, 00:00:00 UTC)
Source: CVE Database V5
Product: markdown-pdf

Description

markdown-pdf version 11.0.0 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate the Markdown content entered by the user.

AI-Powered Analysis

AILast updated: 12/03/2025, 20:31:09 UTC

Technical Analysis

CVE-2023-0835 identifies a Server Side Cross-Site Scripting (XSS) vulnerability in markdown-pdf version 11.0.0, a tool used to convert Markdown documents into PDF format. The root cause is the lack of proper validation and sanitization of user-supplied Markdown content before processing. This flaw enables an external attacker to inject malicious payloads that the server executes, allowing the attacker to read arbitrary local files on the server hosting markdown-pdf. The vulnerability is remotely exploitable without requiring authentication (AV:N/PR:N), but it requires user interaction (UI:R), such as submitting crafted Markdown content. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact on confidentiality is high (C:H) because sensitive files can be disclosed, while integrity impact is low (I:L) and availability impact is none (A:N). Although no public exploits are currently known, the high CVSS score of 8.2 reflects the serious risk posed by this vulnerability. The vulnerability was reserved in February 2023 and published in April 2023. The markdown-pdf tool is commonly used in development environments and automated document generation workflows, making it a critical component in some organizational pipelines. Attackers exploiting this vulnerability could gain access to sensitive configuration files, credentials, or proprietary information stored on the server, potentially leading to further compromise.

Potential Impact

For European organizations, the impact of CVE-2023-0835 can be significant, especially for those relying on markdown-pdf in their software development, documentation, or continuous integration/continuous deployment (CI/CD) pipelines. Exposure of arbitrary local files can lead to leakage of sensitive intellectual property, user data, or internal system configurations. This can result in reputational damage, regulatory non-compliance (e.g., GDPR violations due to data exposure), and potential lateral movement within networks if attackers leverage disclosed credentials or secrets. The vulnerability's remote exploitability without authentication increases the attack surface, particularly for organizations exposing markdown-pdf processing services to the internet or untrusted users. Although no active exploits are reported, the presence of this vulnerability in critical document generation workflows could be leveraged in targeted attacks against European enterprises, especially those in technology, finance, and government sectors where document confidentiality is paramount.

Mitigation Recommendations

To mitigate CVE-2023-0835, organizations should first check for and apply any official patches or updates released by the markdown-pdf maintainers that address this vulnerability. If patches are not yet available, implement strict input validation and sanitization on all Markdown content before processing, ensuring that potentially malicious scripts or file access attempts are blocked. Employ sandboxing techniques to isolate the markdown-pdf execution environment, limiting file system access to only necessary directories. Restrict network exposure of services using markdown-pdf, ensuring they are not directly accessible from untrusted networks. Monitor logs for unusual file access patterns or attempts to inject malicious Markdown content. Additionally, consider using alternative tools with better security track records or enhanced input validation until the vulnerability is resolved. Regularly audit document generation workflows and educate developers about secure handling of user-supplied content to prevent similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Fluid Attacks
Date Reserved
2023-02-14T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69309dba728fb3f62ec6d162

Added to database: 12/3/2025, 8:29:46 PM

Last enriched: 12/3/2025, 8:31:09 PM

Last updated: 12/5/2025, 1:43:32 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats