{"id":"CVE-2022-41709","details":"Markdownify version 1.4.1 allows an external attacker to execute arbitrary code remotely on any client attempting to view a malicious markdown file through Markdownify. This is possible because the application has the \"nodeIntegration\" option enabled.","aliases":["GHSA-c942-mfmp-p4fh"],"modified":"2026-04-12T05:07:18.295497Z","published":"2022-10-19T17:15:09.653Z","references":[{"type":"ADVISORY","url":"https://github.com/amitmerchant1990/electron-markdownify"},{"type":"EVIDENCE","url":"https://fluidattacks.com/advisories/adams/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/amitmerchant1990/electron-markdownify","events":[{"introduced":"0"},{"last_affected":"ced91436396eb95b4169b643456fb9ab451d791e"}],"database_specific":{"cpe":"cpe:2.3:a:markdownify_project:markdownify:1.4.1:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"1.4.1"}]}}],"versions":["1.4.1","v1.1.1","v1.1.3","v1.1.6","v1.2.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-41709.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}