Parsedown Class-Name Injection
        
  High severity
        
          GitHub Reviewed
      
        Published
          Mar 26, 2022 
          to the GitHub Advisory Database
          •
          Updated Sep 11, 2023 
      
  
Description
        Published to the GitHub Advisory Database
      Mar 26, 2022 
    
  
        Reviewed
      Mar 26, 2022 
    
  
        Last updated
      Sep 11, 2023 
    
  
Parsedown before 1.7.2, when safe mode is used and HTML markup is disabled, might allow attackers to execute arbitrary JavaScript code if a script (already running on the affected page) executes the contents of any element with a specific class. This occurs because spaces are permitted in code block infostrings, which interferes with the intended behavior of a single class name beginning with the language- substring.
References