{"id":"CVE-2022-40276","details":"Zettlr version 2.3.0 allows an external attacker to remotely obtain arbitrary local files on any client that attempts to view a malicious markdown file through Zettlr. This is possible because the application does not have a CSP policy (or at least not strict enough) and/or does not properly validate the contents of markdown files before rendering them.","modified":"2026-04-12T05:06:23.500476Z","published":"2022-11-03T20:15:31.290Z","references":[{"type":"PACKAGE","url":"https://github.com/Zettlr/Zettlr"},{"type":"EVIDENCE","url":"https://fluidattacks.com/advisories/avicii/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/zettlr/zettlr","events":[{"introduced":"0"},{"last_affected":"c71181c27a158eebd366aa12ebfb01c2592b866e"}],"database_specific":{"cpe":"cpe:2.3:a:zettlr:zettlr:2.3.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"2.3.0"}]}}],"versions":["1.8.0","1.8.0-alpha.1","1.8.0-alpha.2","1.8.0-alpha.3","1.8.0-beta","1.8.0-beta.1","1.8.0-beta.2","1.8.0-beta.3","1.8.0-beta.4","v.0.9.0","v0.10.0","v0.11.0","v0.12.0","v0.13.0","v0.14.0","v0.14.1","v0.14.2","v0.14.3","v0.15.0","v0.15.1","v0.15.2","v0.15.3","v0.15.4","v0.15.5","v0.16.0","v0.17.0","v0.17.1","v0.18.0","v0.18.1","v0.18.2","v0.18.3","v0.19.0","v0.20.0","v0.5.0","v0.5.1","v0.6.0","v0.7.0","v0.8.0","v0.8.1","v0.9.1","v0.9.2","v1.0.0","v1.1.0","v1.2.0","v1.2.0-beta","v1.2.0-beta.1","v1.2.1","v1.2.2","v1.2.3","v1.3.0","v1.3.0-alpha","v1.3.0-beta","v1.3.0-beta.1","v1.3.0-beta.2","v1.4.0","v1.4.0-beta","v1.4.0-beta.1","v1.4.0-beta.2","v1.4.1","v1.4.2","v1.4.3","v1.5.0","v1.5.0-beta","v1.5.0-beta.1","v1.5.0-beta.2","v1.6.0","v1.6.0-beta","v1.6.0-beta.1","v1.6.0-beta.2","v1.6.0-beta.3","v1.6.0-beta.4","v1.6.0-beta.5","v1.7.0","v1.7.0-beta","v1.7.0-beta.1","v1.7.0-beta.10","v1.7.0-beta.11","v1.7.0-beta.12","v1.7.0-beta.13","v1.7.0-beta.2","v1.7.0-beta.3","v1.7.0-beta.4","v1.7.0-beta.5","v1.7.0-beta.6","v1.7.0-beta.7","v1.7.0-beta.8","v1.7.0-beta.9","v1.7.1","v1.7.2","v1.7.3","v1.7.4","v1.7.5","v1.8.0","v1.8.0-alpha","v1.8.1","v1.8.2","v1.8.3","v1.8.4","v1.8.5","v1.8.6","v1.8.7","v1.8.8","v1.8.9","v2.0.0","v2.0.0-beta","v2.0.0-beta.1","v2.0.0-beta.2","v2.0.0-beta.3","v2.0.0-beta.4","v2.0.0-beta.5","v2.0.1","v2.0.2","v2.0.3","v2.1.0","v2.1.0-beta","v2.1.1","v2.1.2","v2.1.3","v2.2.0","v2.2.1","v2.2.2","v2.2.3","v2.2.4","v2.2.5","v2.2.6","v2.3.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-40276.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}]}