CVE-2024-28246 Affecting node-katex package, versions <0.13.11+~cs6.0.0-2ubuntu0.1~esm1


Severity

Recommended
medium

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.05% (16th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU2204-NODEKATEX-6500735
  • published19 Jun 2025
  • disclosed25 Mar 2024

Introduced: 25 Mar 2024

CVE-2024-28246  (opens in a new tab)

How to fix?

Upgrade Ubuntu:22.04 node-katex to version 0.13.11+cs6.0.0-2ubuntu0.1esm1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream node-katex package and not the node-katex package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

KaTeX is a JavaScript library for TeX math rendering on the web. Code that uses KaTeX's trust option, specifically that provides a function to blacklist certain URL protocols, can be fooled by URLs in malicious inputs that use uppercase characters in the protocol. In particular, this can allow for malicious input to generate javascript: links in the output, even if the trust function tries to forbid this protocol via trust: (context) =&gt; context.protocol !== &#39;javascript&#39;. Upgrade to KaTeX v0.16.10 to remove this vulnerability.