Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-e73p-589d-7qdm
SummaryJoplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. This vulnerability is caused by differences between how Joplin's HTML sanitizer handles comments and how the browser handles comments. This affects both the Rich Text Editor and the Markdown viewer. However, unlike the Rich Text Editor, the Markdown viewer is `cross-origin isolated`, which prevents JavaScript from directly accessing functions/variables in the toplevel Joplin `window`. This issue is not present in Joplin 3.1.24 and may have been introduced in `9b50539`. This is an XSS vulnerability that impacts users that open untrusted notes in the Rich Text Editor. This vulnerability has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Aliases
0
alias CVE-2025-24028
Fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=aarch64&distroversion=v3.23&reponame=community
1
url pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=armhf&distroversion=v3.23&reponame=community
2
url pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=armv7&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=armv7&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=armv7&distroversion=v3.23&reponame=community
3
url pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=riscv64&distroversion=v3.23&reponame=community
4
url pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=s390x&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=s390x&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=s390x&distroversion=v3.23&reponame=community
5
url pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=x86&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=x86&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=x86&distroversion=v3.23&reponame=community
6
url pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=x86_64&distroversion=v3.23&reponame=community
7
url pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=loongarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=loongarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=loongarch64&distroversion=edge&reponame=community
8
url pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=ppc64le&distroversion=edge&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=ppc64le&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=ppc64le&distroversion=edge&reponame=community
9
url pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=loongarch64&distroversion=v3.23&reponame=community
10
url pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=ppc64le&distroversion=v3.23&reponame=community
11
url pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=aarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=aarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=aarch64&distroversion=edge&reponame=community
12
url pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=armhf&distroversion=edge&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=armhf&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=armhf&distroversion=edge&reponame=community
13
url pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=armv7&distroversion=edge&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=armv7&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=armv7&distroversion=edge&reponame=community
14
url pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=riscv64&distroversion=edge&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=riscv64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=riscv64&distroversion=edge&reponame=community
15
url pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=s390x&distroversion=edge&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=s390x&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=s390x&distroversion=edge&reponame=community
16
url pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=x86&distroversion=edge&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=x86&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=x86&distroversion=edge&reponame=community
17
url pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=x86_64&distroversion=edge&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=x86_64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=x86_64&distroversion=edge&reponame=community
Affected_packages
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24028
reference_id
reference_type
scores
0
value 0.00342
scoring_system epss
scoring_elements 0.56902
published_at 2026-04-18T12:55:00Z
1
value 0.00342
scoring_system epss
scoring_elements 0.56855
published_at 2026-04-07T12:55:00Z
2
value 0.00342
scoring_system epss
scoring_elements 0.56907
published_at 2026-04-08T12:55:00Z
3
value 0.00342
scoring_system epss
scoring_elements 0.5691
published_at 2026-04-09T12:55:00Z
4
value 0.00342
scoring_system epss
scoring_elements 0.56919
published_at 2026-04-11T12:55:00Z
5
value 0.00342
scoring_system epss
scoring_elements 0.56899
published_at 2026-04-12T12:55:00Z
6
value 0.00342
scoring_system epss
scoring_elements 0.56876
published_at 2026-04-13T12:55:00Z
7
value 0.00342
scoring_system epss
scoring_elements 0.56905
published_at 2026-04-16T12:55:00Z
8
value 0.00342
scoring_system epss
scoring_elements 0.56858
published_at 2026-04-02T12:55:00Z
9
value 0.00342
scoring_system epss
scoring_elements 0.56879
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24028
1
reference_url https://github.com/laurent22/joplin/commit/2a058ed8097c2502e152b26394dc1917897f5817
reference_id 2a058ed8097c2502e152b26394dc1917897f5817
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:17:07Z/
url https://github.com/laurent22/joplin/commit/2a058ed8097c2502e152b26394dc1917897f5817
2
reference_url https://github.com/laurent22/joplin/commit/9b505395918bc923f34fe6f3b960bb10e8cf234e
reference_id 9b505395918bc923f34fe6f3b960bb10e8cf234e
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:17:07Z/
url https://github.com/laurent22/joplin/commit/9b505395918bc923f34fe6f3b960bb10e8cf234e
3
reference_url https://github.com/laurent22/joplin/security/advisories/GHSA-5w3c-wph9-hq92
reference_id GHSA-5w3c-wph9-hq92
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:17:07Z/
url https://github.com/laurent22/joplin/security/advisories/GHSA-5w3c-wph9-hq92
4
reference_url https://joplinapp.org/help/dev/spec/note_viewer_isolation
reference_id note_viewer_isolation
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:17:07Z/
url https://joplinapp.org/help/dev/spec/note_viewer_isolation
Weaknesses
0
cwe_id 79
name Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
description The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Exploits
Severity_range_score7.8 - 7.8
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-e73p-589d-7qdm