Outline is an open source, collaborative document editor. A type confusion issue was found in ProseMirror’s rendering process that leads to a Stored Cross-Site Scripting (XSS) vulnerability in Outline. An authenticated user can create a document containing a malicious JavaScript payload. When other users view this document, the malicious Javascript can execute in the origin of Outline. Outline includes CSP rules to prevent third-party code execution, however in the case of self-hosting and having your file storage on the same domain as Outline a malicious payload can be uploaded as a file attachment and bypass those CSP restrictions. This issue has been addressed in release version 0.77.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
| Link | Resource |
|---|---|
| https://github.com/outline/outline/security/advisories/GHSA-888c-mvg8-v6wh | Vendor Advisory Exploit |
| https://github.com/outline/outline/security/advisories/GHSA-888c-mvg8-v6wh | Vendor Advisory Exploit |
Configurations
History
10 Oct 2025, 15:30
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/outline/outline/security/advisories/GHSA-888c-mvg8-v6wh - Vendor Advisory, Exploit | |
| CPE | cpe:2.3:a:getoutline:outline:*:*:*:*:*:*:*:* | |
| First Time |
Getoutline outline
Getoutline |
21 Nov 2024, 09:31
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://github.com/outline/outline/security/advisories/GHSA-888c-mvg8-v6wh - |
16 Jul 2024, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-07-16 17:15
Updated : 2025-10-10 15:30
NVD link : CVE-2024-40626
Mitre link : CVE-2024-40626
CVE.ORG link : CVE-2024-40626
JSON object : View
Products Affected
getoutline
- outline
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
