CVE-2021-42057

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-42057
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-42057.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-42057
Aliases
Published
2021-11-04T21:15:09.080Z
Modified
2025-11-14T12:30:52.789724Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Obsidian Dataview through 0.4.12-hotfix1 allows eval injection. The evalInContext function in executes user input, which allows an attacker to craft malicious Markdown files that will execute arbitrary code once opened. NOTE: 0.4.13 provides a mitigation for some use cases.

References

Affected packages

Git / github.com/blacksmithgu/obsidian-dataview

Affected ranges

Type
GIT
Repo
https://github.com/blacksmithgu/obsidian-dataview
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Last affected
Last affected

Affected versions

0.*

0.1.0
0.1.1
0.1.10
0.1.2
0.1.3
0.1.4
0.1.5
0.1.6
0.1.7
0.1.8
0.1.9
0.2.0
0.2.1
0.2.10
0.2.11
0.2.12
0.2.13
0.2.14
0.2.15
0.2.16
0.2.17
0.2.2
0.2.3
0.2.4
0.2.5
0.2.6
0.2.7
0.2.8
0.2.9
0.3.0
0.3.1
0.3.10
0.3.11
0.3.12
0.3.13
0.3.2
0.3.3
0.3.4
0.3.5
0.3.6
0.3.7
0.3.8
0.3.9
0.4.1
0.4.10
0.4.11
0.4.12
0.4.12-hotfix1
0.4.2
0.4.3
0.4.4
0.4.5
0.4.6
0.4.7
0.4.8

build/main.*

build/main.js

Other

untagged-4ed471ab8721a455dae4