joplin_project CVE Vulnerabilities & Metrics

Focus on joplin_project vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About joplin_project Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with joplin_project. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total joplin_project CVEs: 12
Earliest CVE date: 26 Jun 2018, 16:29 UTC
Latest CVE date: 09 Sep 2024, 15:15 UTC

Latest CVE reference: CVE-2024-40643

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 2

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical joplin_project CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.64

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 7
4.0-6.9 4
7.0-8.9 1
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS joplin_project CVEs

These are the five CVEs with the highest CVSS scores for joplin_project, sorted by severity first and recency.

All CVEs for joplin_project

CVE-2024-40643 joplin_project vulnerability CVSS: 0 09 Sep 2024, 15:15 UTC

Joplin is a free, open source note taking and to-do application. Joplin fails to take into account that "<" followed by a non letter character will not be considered html. As such it is possible to do an XSS by putting an "illegal" tag within a tag.

CVE-2023-39517 joplin_project vulnerability CVSS: 0 21 Jun 2024, 20:15 UTC

Joplin is a free, open source note taking and to-do application. A Cross site scripting (XSS) vulnerability in affected versions allows clicking on an untrusted image link to execute arbitrary shell commands. The HTML sanitizer (`packages/renderer/htmlUtils.ts::sanitizeHtml`) preserves `<map>` `<area>` links. However, unlike `<a>` links, the `target` and `href` attributes are not removed. Additionally, because the note preview pane isn't sandboxed to prevent top navigation, links with `target` set to `_top` can replace the toplevel electron page. Because any toplevel electron page, with Joplin's setup, has access to `require` and can require node libraries, a malicious replacement toplevel page can import `child_process` and execute arbitrary shell commands. This issue has been fixed in commit 7c52c3e9a81a52ef1b42a951f9deb9d378d59b0f which is included in release version 2.12.8. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-37299 joplin_project vulnerability CVSS: 0 30 Jun 2023, 15:15 UTC

Joplin before 2.11.5 allows XSS via an AREA element of an image map.

CVE-2023-37298 joplin_project vulnerability CVSS: 0 30 Jun 2023, 15:15 UTC

Joplin before 2.11.5 allows XSS via a USE element in an SVG document.

CVE-2022-45598 joplin_project vulnerability CVSS: 0 31 Jan 2023, 16:15 UTC

Cross Site Scripting vulnerability in Joplin Desktop App before v2.9.17 allows attacker to execute arbitrary code via improper santization.

CVE-2021-33295 joplin_project vulnerability CVSS: 3.5 16 Jun 2022, 21:15 UTC

Cross Site Scripting (XSS) vulnerability in Joplin Desktop App before 1.8.5 allows attackers to execute aribrary code due to improper sanitizing of html.

CVE-2022-23340 joplin_project vulnerability CVSS: 7.5 08 Feb 2022, 14:15 UTC

Joplin 2.6.10 allows remote attackers to execute system commands through malicious code in user search results.

CVE-2021-37916 joplin_project vulnerability CVSS: 4.3 03 Aug 2021, 00:15 UTC

Joplin before 2.0.9 allows XSS via button and form in the note body.

CVE-2020-28249 joplin_project vulnerability CVSS: 4.3 06 Nov 2020, 07:15 UTC

Joplin 1.2.6 for Desktop allows XSS via a LINK element in a note.

CVE-2020-15930 joplin_project vulnerability CVSS: 4.3 24 Sep 2020, 19:15 UTC

An XSS issue in Joplin desktop 1.0.190 to 1.0.245 allows arbitrary code execution via a malicious HTML embed tag.

CVE-2020-9038 joplin_project vulnerability CVSS: 3.5 17 Feb 2020, 16:15 UTC

Joplin through 1.0.184 allows Arbitrary File Read via XSS.

CVE-2018-1000534 joplin_project vulnerability CVSS: 4.3 26 Jun 2018, 16:29 UTC

Joplin version prior to 1.0.90 contains a XSS evolving into code execution due to enabled nodeIntegration for that particular BrowserWindow instance where XSS was identified from vulnerability in Note content field - information on the fix can be found here https://github.com/laurent22/joplin/commit/494e235e18659574f836f84fcf9f4d4fcdcfcf89 that can result in executing unauthorized code within the rights in which the application is running. This attack appear to be exploitable via Victim synchronizing notes from the cloud services or other note-keeping services which contain malicious code. This vulnerability appears to have been fixed in 1.0.90 and later.