{"id":"CVE-2019-10905","details":"Parsedown before 1.7.2, when safe mode is used and HTML markup is disabled, might allow attackers to execute arbitrary JavaScript code if a script (already running on the affected page) executes the contents of any element with a specific class. This occurs because spaces are permitted in code block infostrings, which interferes with the intended behavior of a single class name beginning with the language- substring.","aliases":["GHSA-62m3-fc7f-jpp8"],"modified":"2026-04-11T18:24:56.292191Z","published":"2019-04-06T20:29:00.447Z","references":[{"type":"ADVISORY","url":"https://github.com/erusev/parsedown/releases/tag/1.7.2"},{"type":"REPORT","url":"https://github.com/erusev/parsedown/issues/699"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/erusev/parsedown","events":[{"introduced":"0"},{"fixed":"d60bcdc46978357759ecb13cb4b078da783f8faf"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"1.7.2"}],"source":["CPE_FIELD","REFERENCES"],"cpe":"cpe:2.3:a:parsedown:parsedown:*:*:*:*:*:*:*:*"}}],"versions":["0.1.0","0.1.1","0.1.2","0.1.3","0.1.4","0.1.5","0.2.0","0.2.1","0.3.0","0.4.0","0.4.1","0.4.2","0.4.3","0.4.4","0.4.5","0.4.6","0.4.7","0.4.8","0.5.0","0.6.0","0.7.0","0.7.1","0.7.2","0.7.3","0.7.4","0.7.5","0.7.6","0.7.7","0.8.0","0.8.1","0.8.2","0.8.3","0.9.0","0.9.1","0.9.2","0.9.3","0.9.4","1.0.0","1.0.0-rc.1","1.0.0-rc.2","1.0.0-rc.3","1.0.0-rc.4","1.0.0-rc.5","1.0.1","1.1.0","1.1.1","1.1.2","1.1.3","1.1.4","1.2.0","1.3.0","1.4.0","1.4.1","1.4.2","1.4.3","1.4.4","1.4.5","1.5.0","1.5.1","1.5.2","1.5.3","1.5.4","1.6.0","1.6.1","1.6.2","1.6.3","1.6.4","1.7.0","1.7.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-10905.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}