mjml-app versions 3.0.4 and 3.1.0-beta were discovered to contain a remote code execution (RCE) via the href attribute.
References
Link | Resource |
---|---|
https://github.com/EQSTLab/PoC/tree/main/2024/LCE/CVE-2024-25293 | Exploit Third Party Advisory |
https://github.com/EQSTLab/PoC/tree/main/2024/LCE/CVE-2024-25293 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
13 May 2025, 14:40
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mjml:mjml_app:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:mjml:mjml_app:3.1.0:beta:*:*:*:*:*:* |
|
First Time |
Mjml mjml App
Mjml |
|
References | () https://github.com/EQSTLab/PoC/tree/main/2024/LCE/CVE-2024-25293 - Exploit, Third Party Advisory |
Information
Published : 2024-03-01 06:15
Updated : 2025-05-13 14:40
NVD link : CVE-2024-25293
Mitre link : CVE-2024-25293
CVE.ORG link : CVE-2024-25293
JSON object : View
Products Affected
mjml
- mjml_app
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')