CVE Vulnerabilities for Obsidian
CVE | Published | Severity | Details | Exploitability | Impact | Vector |
---|---|---|---|---|---|---|
CVE‑2023‑33244 | 2023‑05‑20 19:15:09 | HIGH (8) | Obsidian before 1.2.2 allows calls to unintended APIs (for microphone access, camera access, and desktop notification) via an embedded web page. | 4 | 4 | NETWORK |
CVE‑2023‑27035 | 2023‑05‑01 22:15:10 | HIGH (8) | An issue discovered in Obsidian Canvas 1.1.9 allows remote attackers to send desktop notifications, record user audio and other unspecified impacts via embedded website on the canvas page. | 4 | 4 | NETWORK |
CVE‑2023‑2110 | 2023‑08‑19 06:15:46 | HIGH (7) | Improper path handling in Obsidian desktop before 1.2.8 on Windows, Linux and macOS allows a crafted webpage to access local files and exfiltrate them to remote web servers via "app://local/<absolute-path>". This vulnerability can be exploited if a user opens a malicious markdown file in Obsidian, or copies text from a malicious webpage and paste it into Obsidian. | 2 | 5 | LOCAL |
CVE‑2022‑36450 | 2022‑07‑25 07:15:08 | CRITICAL (10) | Obsidian 0.14.x and 0.15.x before 0.15.5 allows obsidian://hook-get-address remote code execution because window.open is used without checking the URL. | 4 | 6 | NETWORK |
CVE‑2021‑38148 | 2021‑08‑07 03:15:07 | CRITICAL (10) | Obsidian before 0.12.12 does not require user confirmation for non-http/https URLs. | 4 | 6 | NETWORK |
View OS-specific patching for:
Windows Mac Linux
Logos, products, trade names, and company names are all the property of their respective trademark holders.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.