MDC is a tool to take regular Markdown and write documents interacting deeply with a Vue component. Prior to version 0.17.2, a remote script-inclusion / stored cross-site scripting vulnerability in @nuxtjs/mdc lets a Markdown author inject a `<base href="https://attacker.tld">` element. The `<base>` tag rewrites how all subsequent relative URLs are resolved, so an attacker can make the page load scripts, styles, or images from an external, attacker-controlled origin and execute arbitrary JavaScript in the site’s context. Version 0.17.2 contains a fix for the issue.
Metrics
Affected Vendors & Products
References
History
Tue, 22 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 18 Jul 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | MDC is a tool to take regular Markdown and write documents interacting deeply with a Vue component. Prior to version 0.17.2, a remote script-inclusion / stored cross-site scripting vulnerability in @nuxtjs/mdc lets a Markdown author inject a `<base href="https://attacker.tld">` element. The `<base>` tag rewrites how all subsequent relative URLs are resolved, so an attacker can make the page load scripts, styles, or images from an external, attacker-controlled origin and execute arbitrary JavaScript in the site’s context. Version 0.17.2 contains a fix for the issue. | |
Title | mdc vulnerable to XSS in markdown rendering bypassing HTML filter. (N°4) | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-18T15:47:38.236Z
Updated: 2025-07-22T15:14:53.051Z
Reserved: 2025-07-16T13:22:18.205Z
Link: CVE-2025-54075

Updated: 2025-07-22T15:14:45.477Z

Status : Awaiting Analysis
Published: 2025-07-18T16:15:30.557
Modified: 2025-07-22T16:15:33.560
Link: CVE-2025-54075

No data.