Inefficient Regular Expression Vulnerability in MarkText by MarkText
CVE-2025-6492
Key Information:
Badges
What is CVE-2025-6492?
A vulnerability has been identified in MarkText, specifically in the function getRecommendTitleFromMarkdownString within the index.js file. This issue arises from inefficient regular expression complexity that can be exploited remotely. The vulnerability was disclosed publicly, increasing the risk of attacks that manipulate this function, potentially leading to denial of service or other malicious outcomes. Users are encouraged to update to the latest versions to mitigate this risk.
Affected Version(s)
MarkText 0.17.0
MarkText 0.17.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved