Parsed HTML anchor links in Markdown provided to parseMarkdown can result in XSS in @nuxtjs/mdc
- Severity:
- High
Description
An unsafe parsing logic of the URL from markdown can lead to arbitrary JavaScript code due to a bypass to the existing guards around the javascript:
protocol scheme in the URL.
Recommendation
Update the @nuxtjs/mdc
package to the latest compatible version. Followings are version details:
- Affected version(s): <= 0.13.2
- Patched version(s): 0.13.3
References
Related Issues
- Nuxt MDC has an XSS vulnerability in markdown rendering that bypasses HTML filtering - CVE-2025-54075
- Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code - CVE-2023-45133
- Websites were able to send any requests to the development server and read the response in vite - CVE-2025-24010
- Vega Expression Language `scale` expression function Cross Site Scripting (GHSA-4vq7-882g-wcg4) - CVE-2023-26486
- Tags:
- npm
- @nuxtjs/mdc
Anything's wrong? Let us know Last updated on February 06, 2025