Nuxt MDC has an XSS vulnerability in markdown rendering that bypasses HTML filtering
- Severity:
- High
Description
A remote script-inclusion / stored XSS vulnerability in @nuxtjs/mdc lets a Markdown author inject a <base href="https://attacker.tld">
element.
Recommendation
Update the @nuxtjs/mdc
package to the latest compatible version. Followings are version details:
- Affected version(s): < 0.17.2
- Patched version(s): 0.17.2
References
Related Issues
- http-proxy-middleware allows fixRequestBody to proceed even if bodyParser has failed - CVE-2025-32997
- Parsed HTML anchor links in Markdown provided to parseMarkdown can result in XSS in @nuxtjs/mdc - CVE-2025-24981
- DOM Clobbering Gadget found in Rspack's AutoPublicPathRuntimeModule that leads to XSS - Vulnerability
- Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//) - CVE-2023-34092
- Tags:
- npm
- @nuxtjs/mdc
Anything's wrong? Let us know Last updated on July 20, 2025