joplin_project CVE Vulnerabilities & Metrics

Focus on joplin_project vulnerabilities and metrics.

Last updated: 16 Apr 2025, 22:25 UTC

About joplin_project Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with joplin_project. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total joplin_project CVEs: 16
Earliest CVE date: 26 Jun 2018, 16:29 UTC
Latest CVE date: 07 Feb 2025, 23:15 UTC

Latest CVE reference: CVE-2025-25187

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 6

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 200.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 200.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical joplin_project CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 1.98

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 11
4.0-6.9 4
7.0-8.9 1
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS joplin_project CVEs

These are the five CVEs with the highest CVSS scores for joplin_project, sorted by severity first and recency.

All CVEs for joplin_project

CVE-2025-25187 joplin_project vulnerability CVSS: 0 07 Feb 2025, 23:15 UTC

Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. This vulnerability is caused by adding note titles to the document using React's `dangerouslySetInnerHTML`, without first escaping HTML entities. Joplin lacks a Content-Security-Policy with a restrictive `script-src`. This allows arbitrary JavaScript execution via inline `onclick`/`onload` event handlers in unsanitized HTML. Additionally, Joplin's main window is created with `nodeIntegration` set to `true`, allowing arbitrary JavaScript execution to result in arbitrary code execution. Anyone who 1) receives notes from unknown sources and 2) uses <kbd>ctrl</kbd>-<kbd>p</kbd> to search is impacted. This issue has been addressed in version 3.1.24 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2024-40643 joplin_project vulnerability CVSS: 0 09 Sep 2024, 15:15 UTC

Joplin is a free, open source note taking and to-do application. Joplin fails to take into account that "<" followed by a non letter character will not be considered html. As such it is possible to do an XSS by putting an "illegal" tag within a tag.

CVE-2023-45673 joplin_project vulnerability CVSS: 0 21 Jun 2024, 20:15 UTC

Joplin is a free, open source note taking and to-do application. A remote code execution (RCE) vulnerability in affected versions allows clicking on a link in a PDF in an untrusted note to execute arbitrary shell commands. Clicking links in PDFs allows for arbitrary code execution because Joplin desktop: 1. has not disabled top redirection for note viewer iframes, and 2. and has node integration enabled. This is a remote code execution vulnerability that impacts anyone who attaches untrusted PDFs to notes and has the icon enabled. This issue has been addressed in version 2.13.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-39517 joplin_project vulnerability CVSS: 0 21 Jun 2024, 20:15 UTC

Joplin is a free, open source note taking and to-do application. A Cross site scripting (XSS) vulnerability in affected versions allows clicking on an untrusted image link to execute arbitrary shell commands. The HTML sanitizer (`packages/renderer/htmlUtils.ts::sanitizeHtml`) preserves `<map>` `<area>` links. However, unlike `<a>` links, the `target` and `href` attributes are not removed. Additionally, because the note preview pane isn't sandboxed to prevent top navigation, links with `target` set to `_top` can replace the toplevel electron page. Because any toplevel electron page, with Joplin's setup, has access to `require` and can require node libraries, a malicious replacement toplevel page can import `child_process` and execute arbitrary shell commands. This issue has been fixed in commit 7c52c3e9a81a52ef1b42a951f9deb9d378d59b0f which is included in release version 2.12.8. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-38506 joplin_project vulnerability CVSS: 0 21 Jun 2024, 20:15 UTC

Joplin is a free, open source note taking and to-do application. A Cross-site Scripting (XSS) vulnerability allows pasting untrusted data into the rich text editor to execute arbitrary code. HTML pasted into the rich text editor is not sanitized (or not sanitized properly). As such, the `onload` attribute of pasted images can execute arbitrary code. Because the TinyMCE editor frame does not use the `sandbox` attribute, such scripts can access NodeJS's `require` through the `top` variable. From this, an attacker can run arbitrary commands. This issue has been addressed in version 2.12.10 and users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-37898 joplin_project vulnerability CVSS: 0 21 Jun 2024, 20:15 UTC

Joplin is a free, open source note taking and to-do application. A Cross-site Scripting (XSS) vulnerability allows an untrusted note opened in safe mode to execute arbitrary code. `packages/renderer/MarkupToHtml.ts` renders note content in safe mode by surrounding it with <pre> and </pre>, without escaping any interior HTML tags. Thus, an attacker can create a note that closes the opening <pre> tag, then includes HTML that runs JavaScript. Because the rendered markdown iframe has the same origin as the toplevel document and is not sandboxed, any scripts running in the preview iframe can access the top variable and, thus, access the toplevel NodeJS `require` function. `require` can then be used to import modules like fs or child_process and run arbitrary commands. This issue has been addressed in version 2.12.9 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-37299 joplin_project vulnerability CVSS: 0 30 Jun 2023, 15:15 UTC

Joplin before 2.11.5 allows XSS via an AREA element of an image map.

CVE-2023-37298 joplin_project vulnerability CVSS: 0 30 Jun 2023, 15:15 UTC

Joplin before 2.11.5 allows XSS via a USE element in an SVG document.

CVE-2022-45598 joplin_project vulnerability CVSS: 0 31 Jan 2023, 16:15 UTC

Cross Site Scripting vulnerability in Joplin Desktop App before v2.9.17 allows attacker to execute arbitrary code via improper santization.

CVE-2021-33295 joplin_project vulnerability CVSS: 3.5 16 Jun 2022, 21:15 UTC

Cross Site Scripting (XSS) vulnerability in Joplin Desktop App before 1.8.5 allows attackers to execute aribrary code due to improper sanitizing of html.

CVE-2022-23340 joplin_project vulnerability CVSS: 7.5 08 Feb 2022, 14:15 UTC

Joplin 2.6.10 allows remote attackers to execute system commands through malicious code in user search results.

CVE-2021-37916 joplin_project vulnerability CVSS: 4.3 03 Aug 2021, 00:15 UTC

Joplin before 2.0.9 allows XSS via button and form in the note body.

CVE-2020-28249 joplin_project vulnerability CVSS: 4.3 06 Nov 2020, 07:15 UTC

Joplin 1.2.6 for Desktop allows XSS via a LINK element in a note.

CVE-2020-15930 joplin_project vulnerability CVSS: 4.3 24 Sep 2020, 19:15 UTC

An XSS issue in Joplin desktop 1.0.190 to 1.0.245 allows arbitrary code execution via a malicious HTML embed tag.

CVE-2020-9038 joplin_project vulnerability CVSS: 3.5 17 Feb 2020, 16:15 UTC

Joplin through 1.0.184 allows Arbitrary File Read via XSS.

CVE-2018-1000534 joplin_project vulnerability CVSS: 4.3 26 Jun 2018, 16:29 UTC

Joplin version prior to 1.0.90 contains a XSS evolving into code execution due to enabled nodeIntegration for that particular BrowserWindow instance where XSS was identified from vulnerability in Note content field - information on the fix can be found here https://github.com/laurent22/joplin/commit/494e235e18659574f836f84fcf9f4d4fcdcfcf89 that can result in executing unauthorized code within the rights in which the application is running. This attack appear to be exploitable via Victim synchronizing notes from the cloud services or other note-keeping services which contain malicious code. This vulnerability appears to have been fixed in 1.0.90 and later.