CVE-2025-67843
📋 TL;DR
This Server-Side Template Injection vulnerability in Mintlify's MDX Rendering Engine allows attackers to execute arbitrary code by injecting malicious JSX expressions in MDX files. It affects all Mintlify Platform instances before November 15, 2025. Attackers can achieve remote code execution on affected systems.
💻 Affected Systems
- Mintlify Platform
📦 What is this software?
Mintlify by Mintlify
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control over the server, data exfiltration, lateral movement, and persistent backdoor installation.
Likely Case
Remote code execution leading to data theft, service disruption, and potential deployment of malware or ransomware.
If Mitigated
Limited impact with proper input validation and sandboxing, potentially only causing denial of service or limited data exposure.
🎯 Exploit Status
Exploitation requires uploading or injecting malicious MDX content with JSX expressions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions from 2025-11-15 onward
Vendor Advisory: https://www.mintlify.com/blog/working-with-security-researchers-november-2025
Restart Required: Yes
Instructions:
1. Update Mintlify Platform to version dated 2025-11-15 or later. 2. Restart the Mintlify service. 3. Verify the update was successful.
🔧 Temporary Workarounds
Disable MDX file uploads
allTemporarily block MDX file uploads or processing until patching is complete.
Configure web server/WAF to block .mdx file uploads
Input validation filter
allImplement strict validation to reject MDX files containing JSX expressions.
Implement regex filter: /<[^>]*>/ to detect JSX
🧯 If You Can't Patch
- Implement strict WAF rules to block MDX file uploads containing JSX patterns
- Isolate Mintlify instances in network segments with limited access
🔍 How to Verify
Check if Vulnerable:
Check Mintlify version date - if before 2025-11-15, system is vulnerable.
Check Version:
Check Mintlify admin panel or deployment logs for version information
Verify Fix Applied:
Verify Mintlify version is 2025-11-15 or later and test MDX processing with safe content.
📡 Detection & Monitoring
Log Indicators:
- Unusual MDX file uploads
- JSX expression patterns in logs
- Unexpected process execution
Network Indicators:
- Suspicious file uploads to MDX endpoints
- Outbound connections from Mintlify to unknown destinations
SIEM Query:
source="mintlify" AND (file_extension=".mdx" OR content CONTAINS "<" AND ">")