CVE-2025-66400
ADVISORY - githubSummary
Impact
Multiple (unprefixed) classnames could be added in markdown source by using character references.
This could make rendered user supplied markdown code elements appear like the rest of the page.
The following markdown:
```js xss
```
Would create <pre><code class="language-js xss"></code></pre>
If your page then applied .xss classes (or listeners in JS), those apply to this element.
For more info see https://github.com/ChALkeR/notes/blob/master/Improper-markup-sanitization.md#unsanitized-class-attribute
Patches
The bug was patched. When using regular semver, run npm install. For exact ranges, make sure to use 13.2.1.
Workarounds
Update.
References
Common Weakness Enumeration (CWE)
Improper Input Validation
Improperly Controlled Modification of Dynamically-Determined Object Attributes
NIST
3.9
CVSS SCORE
6.9mediumGitHub
CVSS SCORE
6.9mediumRed Hat
3.9
CVSS SCORE
5.3mediumChainguard
CGA-4hfg-gx73-rgq3
-
Chainguard
CGA-hcqh-7fp3-46h9
-
Chainguard
CGA-jvq9-2qrm-h8fg
-
Chainguard
CGA-rr75-qx7x-g5cr
-
Chainguard
CGA-w36q-h49w-64xx
-