Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 16 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Markdownify 1.2.0 contains a persistent cross-site scripting vulnerability that allows attackers to store malicious payloads within markdown files. Attackers can upload crafted markdown files with embedded scripts that execute when the file is opened, potentially enabling remote code execution. | |
| Title | Markdownify 1.2.0 - Persistent Cross-Site Scripting | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-16T21:09:54.575Z
Reserved: 2026-01-14T17:11:19.901Z
Link: CVE-2021-47837
Updated: 2026-01-16T21:00:38.849Z
Status : Received
Published: 2026-01-16T19:16:09.223
Modified: 2026-01-16T22:16:17.080
Link: CVE-2021-47837
No data.
OpenCVE Enrichment
No data.