{"id":"CVE-2022-0748","details":"The package post-loader from 0.0.0 are vulnerable to Arbitrary Code Execution which uses a markdown parser in an unsafe way so that any javascript code inside the markdown input files gets evaluated and executed.","aliases":["GHSA-66ww-999q-mffq"],"modified":"2026-04-12T05:16:33.192940Z","published":"2022-03-17T12:15:07.923Z","related":["SNYK-JS-POSTLOADER-2403737"],"references":[{"type":"EVIDENCE","url":"https://snyk.io/vuln/SNYK-JS-POSTLOADER-2403737"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/egoist/post-loader","events":[{"introduced":"0"},{"last_affected":"594713da1c6f30cf096b33c2f354fff8fa26a032"}],"database_specific":{"cpe":"cpe:2.3:a:post-loader_project:post-loader:*:*:*:*:*:node.js:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"2.0.0"}],"source":"CPE_FIELD"}}],"versions":["v1.0.0","v1.1.0","v1.1.1","v1.1.2","v2.0.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-0748.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}