CVE-2025-56683

9.6 CRITICAL

📋 TL;DR

This cross-site scripting (XSS) vulnerability in Logseq v0.10.9 allows attackers to execute arbitrary JavaScript code by injecting malicious scripts into README.md files that are processed by the /app/marketplace.html component. This affects all users running the vulnerable version of Logseq, potentially leading to remote code execution if combined with other vulnerabilities.

💻 Affected Systems

Products:
  • Logseq
Versions: v0.10.9
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the marketplace component that processes README.md files, which are commonly used in plugin and theme installations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers achieve remote code execution on user systems, potentially compromising sensitive data, installing malware, or taking full control of affected devices.

🟠

Likely Case

Attackers execute arbitrary JavaScript in the context of the Logseq application, enabling session hijacking, credential theft, and unauthorized access to local files.

🟢

If Mitigated

With proper input validation and output encoding, the XSS payloads would be neutralized, preventing script execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires tricking users into opening malicious README.md files, which could be distributed via plugin repositories or social engineering.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in commit 4cdf49aedd8de073015b6945a529399c3bfa109a

Vendor Advisory: https://github.com/logseq/logseq/commit/4cdf49aedd8de073015b6945a529399c3bfa109a

Restart Required: Yes

Instructions:

1. Update Logseq to the latest version. 2. Restart the application. 3. Verify the fix by checking that the marketplace.html component properly sanitizes README.md content.

🔧 Temporary Workarounds

Disable Marketplace Access

all

Temporarily disable access to the marketplace component to prevent exploitation.

# Modify application configuration to disable marketplace features
# Block access to /app/marketplace.html in application settings

Content Security Policy

all

Implement strict Content Security Policy headers to restrict script execution.

# Add CSP header: Content-Security-Policy: script-src 'self'

🧯 If You Can't Patch

  • Restrict user permissions to prevent execution of arbitrary scripts
  • Implement network segmentation to isolate vulnerable systems

🔍 How to Verify

Check if Vulnerable:

Check if Logseq version is 0.10.9 and test if README.md files with JavaScript payloads execute in the marketplace component.

Check Version:

logseq --version or check application settings for version information

Verify Fix Applied:

Verify that the commit 4cdf49aedd8de073015b6945a529399c3bfa109a is included in your Logseq installation and test that JavaScript in README.md files no longer executes.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript execution in marketplace context
  • Suspicious file access patterns from README.md processing

Network Indicators:

  • Unexpected outbound connections from Logseq process
  • Downloads of suspicious README.md files

SIEM Query:

process_name:"Logseq" AND (event_type:"script_execution" OR file_path:"README.md")

🔗 References

📤 Share & Export