{ "schema_version": "1.4.0", "id": "GHSA-gq8w-3h98-m48x", "modified": "2025-05-02T21:30:36Z", "published": "2022-11-04T12:00:25Z", "aliases": [ "CVE-2022-40276" ], "details": "Zettlr version 2.3.0 allows an external attacker to remotely obtain arbitrary local files on any client that attempts to view a malicious markdown file through Zettlr. This is possible because the application does not have a CSP policy (or at least not strict enough) and/or does not properly validate the contents of markdown files before rendering them.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40276" }, { "type": "WEB", "url": "https://fluidattacks.com/advisories/avicii" }, { "type": "WEB", "url": "https://github.com/Zettlr/Zettlr" } ], "database_specific": { "cwe_ids": [ "CWE-20" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-11-03T20:15:00Z" } }