Parsed HTML anchor links in Markdown provided to parseMarkdown can result in XSS in @nuxtjs/mdc
- Severity:
- High
Description
An unsafe parsing logic of the URL from markdown can lead to arbitrary JavaScript code due to a bypass to the existing guards around the javascript: protocol scheme in the URL.
Recommendation
Update the @nuxtjs/mdc package to the latest compatible version. Followings are version details:
- Affected version(s): <= 0.13.2
- Patched version(s): 0.13.3
References
Related Issues
- TypeORM vulnerable to SQL injection via crafted request to repository.save or repository.update - CVE-2025-60542
- Websites were able to send any requests to the development server and read the response in vite - CVE-2025-24010
- Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code - CVE-2023-45133
- Nuxt MDC has an XSS vulnerability in markdown rendering that bypasses HTML filtering - CVE-2025-54075
- Tags:
- npm
- @nuxtjs/mdc
Anything's wrong? Let us know Last updated on February 06, 2025