Obsidian Mind Map v1.1.0 allows attackers to execute arbitrary code via a crafted payload injected into an uploaded document.
References
| Link | Resource |
|---|---|
| https://github.com/JoJenH/Note4SelfVul/blob/main/obsidian-mind-map.md | Exploit |
| https://github.com/lynchjames/obsidian-mind-map/issues/87 | Issue Tracking |
| https://github.com/JoJenH/Note4SelfVul/blob/main/obsidian-mind-map.md | Exploit |
| https://github.com/lynchjames/obsidian-mind-map/issues/87 | Issue Tracking |
Configurations
History
08 May 2025, 22:54
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Lynchjames
Lynchjames obsidian Mind Map |
|
| CPE | cpe:2.3:a:lynchjames:obsidian_mind_map:1.1.0:*:*:*:*:*:*:* | |
| References | () https://github.com/JoJenH/Note4SelfVul/blob/main/obsidian-mind-map.md - Exploit | |
| References | () https://github.com/lynchjames/obsidian-mind-map/issues/87 - Issue Tracking |
Information
Published : 2024-02-29 01:35
Updated : 2025-05-08 22:54
NVD link : CVE-2022-36677
Mitre link : CVE-2022-36677
CVE.ORG link : CVE-2022-36677
JSON object : View
Products Affected
lynchjames
- obsidian_mind_map
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
