hexo-editor@1.0.0 vulnerabilities

A web editor for hexo.

Direct Vulnerabilities

Known vulnerabilities in the hexo-editor package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-site Scripting (XSS)

hexo-editor is a web editor for hexo blog platform.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) attacks due to an enabled node integration. If the victim is tricked into pasting such code or open a crafted file in the markdown editor, the attacker will be able to steal user’s data from the computer or perform any actions on the machine that the application running on.

PoC by silviavali:

<s <onmouseover="alert(1)"> <s onmouseover="var {shell} = require('electron');
shell.openExternal('file:/etc/passwd'); alert('XSS to code execution')">Hallo</s>

Then, hovering over the word Hallo, the /etc/passwd file and an alert with words “XSS to code execution” will show up.

How to fix Cross-site Scripting (XSS)?

Ther is no fix version for hexo-editor.

*
  • M
Cross-site Scripting (XSS)

hexo-editor is a web editor for hexo blog platform.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) attacks due to an enabled node integration. If the victim is tricked into pasting such code or open a crafted file in the markdown editor, the attacker will be able to steal user’s data from the computer or perform any actions on the machine that the application running on.

PoC by silviavali:

<s <onmouseover="alert(1)"> <s onmouseover="var {shell} = require('electron');
shell.openExternal('file:/etc/passwd'); alert('XSS to code execution')">Hallo</s>

Then, hovering over the word Hallo, the /etc/passwd file and an alert with words “XSS to code execution” will show up.

How to fix Cross-site Scripting (XSS)?

Ther is no fix version for hexo-editor.

*