Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-77fj-vx54-gvh7 | Go Markdown has an Out-of-bounds Read in SmartypantsRenderer |
Mon, 27 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gomarkdown:markdown:*:*:*:*:*:go:*:* |
Sat, 25 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1286 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 22 Apr 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gomarkdown
Gomarkdown markdown |
|
| Vendors & Products |
Gomarkdown
Gomarkdown markdown |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The package `github.com/gomarkdown/markdown` is a Go library for parsing Markdown text and rendering as HTML. Processing a malformed input containing a < character that is not followed by a > character anywhere in the remaining text with a SmartypantsRenderer will lead to Out of Bounds read or a panic. This vulnerability is fixed with commit 759bbc3e32073c3bc4e25969c132fc520eda2778. | |
| Title | github.com/gomarkdown/markdown: Out-of-bounds Read in SmartypantsRenderer | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-21T20:36:07.854Z
Reserved: 2026-04-15T16:37:22.766Z
Link: CVE-2026-40890
Updated: 2026-04-21T20:16:30.316Z
Status : Analyzed
Published: 2026-04-21T20:17:02.810
Modified: 2026-04-27T15:07:26.230
Link: CVE-2026-40890
OpenCVE Enrichment
Updated: 2026-04-28T16:30:35Z
Github GHSA