Joplin is an open source, privacy-focused note taking app with sync capabilities for Windows, macOS, Linux, Android and iOS. In affected versions attackers are able to abuse the fact that openExternal is used without any filtering of URI schemes to obtain remote code execution in Windows environments. This issue has been addressed in version 3.0.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/laurent22/joplin/security/advisories/GHSA-pc5v-xp44-5mgv | Exploit Vendor Advisory |
Configurations
History
07 May 2025, 00:13
Type | Values Removed | Values Added |
---|---|---|
First Time |
Joplin Project
Joplin Project joplin |
|
CPE | cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:* | |
References | () https://github.com/laurent22/joplin/security/advisories/GHSA-pc5v-xp44-5mgv - Exploit, Vendor Advisory |
25 Nov 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-25 20:15
Updated : 2025-05-07 00:13
NVD link : CVE-2024-53268
Mitre link : CVE-2024-53268
CVE.ORG link : CVE-2024-53268
JSON object : View
Products Affected
joplin_project
- joplin
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')