markdown-to-jsx@6.3.0 vulnerabilities

Convert markdown to JSX with ease for React and React-like projects. Super lightweight and highly configurable.

  • latest version

    7.7.1

  • latest non vulnerable version

  • first published

    9 years ago

  • latest version published

    7 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the markdown-to-jsx package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Cross-site Scripting (XSS)

    markdown-to-jsx is a lightweight, customizable React markdown component.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the src property due to improper input sanitization. An attacker can execute arbitrary code by injecting a malicious iframe element in the markdown.

    How to fix Cross-site Scripting (XSS)?

    Upgrade markdown-to-jsx to version 7.4.0 or higher.

    <7.4.0
    • M
    Regular Expression Denial of Service (ReDoS)

    markdown-to-jsx is a lightweight, customizable React markdown component.

    Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). Catastrophic backtracking in the BREAK_THEMATIC_R regex causes parsing to hang on non-matching input with repeating asterisks

    How to fix Regular Expression Denial of Service (ReDoS)?

    Upgrade markdown-to-jsx to version 7.2.0 or higher.

    <7.2.0
    • H
    Cross-site Scripting (XSS)

    markdown-to-jsx is a lightweight, customizable React markdown component.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Due to insufficient input sanitization the package may render output containing malicious JavaScript. This vulnerability can be exploited through input of links containing data or VBScript URIs and a base64-encoded payload.

    How to fix Cross-site Scripting (XSS)?

    Upgrade markdown-to-jsx to version 6.11.4 or higher.

    <6.11.4
    • H
    Cross-site Scripting (XSS)

    markdown-to-jsx is a lightweight, customizable React markdown component.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It is possible to circumvent sanitisation and inject script and style tags by using upper case letters, for example: <SCRIPT>alert('hi')</SCRIPT>.

    How to fix Cross-site Scripting (XSS)?

    Upgrade markdown-to-jsx to version 6.10.0 or higher.

    <6.10.0