No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 07 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Alam00000
Alam00000 bentopdf |
|
| Vendors & Products |
Alam00000
Alam00000 bentopdf |
Thu, 07 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | BentoPDF is a client-side PDF toolkit that is self hostable. Prior to version 2.8.3, a cross-site scripting vulnerability was identified in BentoPD. An attacker may be able to execute arbitrary JavaScript in certain circumstances in Markdown to PDF Tool. This issue has been patched in version 2.8.3. | |
| Title | BentoPDF: Stored XSS via Markdown Editor Leading to Persistent File Exfiltration | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-07T19:01:30.967Z
Reserved: 2026-04-21T23:58:43.802Z
Link: CVE-2026-41653
Updated: 2026-05-07T19:01:28.393Z
Status : Deferred
Published: 2026-05-07T19:16:00.670
Modified: 2026-05-07T19:51:36.220
Link: CVE-2026-41653
No data.
OpenCVE Enrichment
Updated: 2026-05-07T21:30:25Z