Skip to content

XSS vulnerability found in the Wechatsync markdown preview page #118

Open
@jackfromeast

Description

Hi, Wechatsync developer!

Currently, the markdown rendering page does not sanitize user input for scripts, which can lead to Cross-site Scripting (XSS) in the markdown preview page.

Payload

<img src=1 onerror="javascript:alert(document.domain)">

PoC

tmp

Impact

Users of Wecharsync who open untrusted markdown files on the platform (i.e., https://www.wechatsync.com/md/) are vulnerable to XSS attacks.

Note that, since the project doesn't set the security policy, I directly report the vulnerability here.

Activity

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions