docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page.
{
"cwe_ids": [
"CWE-79"
],
"github_reviewed_at": "2021-05-10T21:00:22Z",
"github_reviewed": true,
"severity": "MODERATE",
"nvd_published_at": "2020-07-20T16:15:00Z"
}