Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-26660 | mcp-markdownify-server vulnerable to command injection in pptx-to-markdown tool |
Github GHSA |
GHSA-45qj-4xq3-3c45 | mcp-markdownify-server vulnerable to command injection in pptx-to-markdown tool |
Thu, 04 Sep 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 04 Sep 2025 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Markdownify is a Model Context Protocol server for converting almost anything to Markdown. Versions below 0.0.2 contain a command injection vulnerability, caused by the unsanitized use of input parameters within a call to child_process.exec, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process's privileges. The server constructs and executes shell commands using unvalidated user input directly within command-line strings. This introduces the possibility of shell metacharacter injection (|, >, &&, etc.). This issue is fixed in version 0.0.2. | |
| Title | Markdownify is vulnerable to command injection through pptx-to-markdown tool | |
| Weaknesses | CWE-77 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-04T17:55:09.521Z
Reserved: 2025-08-29T16:19:59.010Z
Link: CVE-2025-58358
Updated: 2025-09-04T17:55:05.902Z
Status : Deferred
Published: 2025-09-04T10:42:32.993
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-58358
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA