-
Notifications
You must be signed in to change notification settings - Fork 0
Description
Vulnerable Library - codemirror-5.59.2.min.js
In-browser code editing made bearable
Library home page: https://cdnjs.cloudflare.com/ajax/libs/codemirror/5.59.2/codemirror.min.js
Path to dependency file: /docs/index.html
Path to vulnerable library: /docs/index.html
Vulnerabilities
| Vulnerability | Severity | Exploit Maturity | EPSS | Dependency | Type | Fixed in (codemirror version) | Remediation Possible** | Reachability | |
|---|---|---|---|---|---|---|---|---|---|
| CVE-2025-6493 | 5.3 | Not Defined | codemirror-5.59.2.min.js | Direct | N/A | ❌ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2025-6493
Vulnerable Library - codemirror-5.59.2.min.js
In-browser code editing made bearable
Library home page: https://cdnjs.cloudflare.com/ajax/libs/codemirror/5.59.2/codemirror.min.js
Path to dependency file: /docs/index.html
Path to vulnerable library: /docs/index.html
Dependency Hierarchy:
- ❌ codemirror-5.59.2.min.js (Vulnerable Library)
Found in base branch: master
Vulnerability Details
A vulnerability was found in CodeMirror up to 5.17.0 and classified as problematic. Affected by this issue is some unknown functionality of the file mode/markdown/markdown.js of the component Markdown Mode. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Not all code samples mentioned in the GitHub issue can be found. The repository mentions, that "CodeMirror 6 exists, and is [...] much more actively maintained."
Publish Date: 2025-06-22
URL: CVE-2025-6493
Threat Assessment
Exploit Maturity: Not Defined
EPSS:
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low