MDC is a tool to take regular Markdown and write documents interacting deeply with a Vue component. Prior to version 0.17.2, a remote script-inclusion / stored cross-site scripting vulnerability in @nuxtjs/mdc lets a Markdown author inject a `<base href="https://attacker.tld">` element. The `<base>` tag rewrites how all subsequent relative URLs are resolved, so an attacker can make the page load scripts, styles, or images from an external, attacker-controlled origin and execute arbitrary JavaScript in the site’s context. Version 0.17.2 contains a fix for the issue.
References
Configurations
No configuration.
History
22 Jul 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/nuxt-modules/mdc/security/advisories/GHSA-cj6r-rrr9-fg82 - |
22 Jul 2025, 13:06
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
18 Jul 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-18 16:15
Updated : 2025-07-22 16:15
NVD link : CVE-2025-54075
Mitre link : CVE-2025-54075
CVE.ORG link : CVE-2025-54075
JSON object : View
Products Affected
No product.
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')