CVE-2024-22051

9.8 CRITICAL
Published: January 04, 2024 Modified: November 29, 2025

Description

CommonMarker versions prior to 0.23.4 are at risk of an integer overflow vulnerability. This vulnerability can result in possibly unauthenticated remote attackers to cause heap memory corruption, potentially leading to an information leak or remote code execution, via parsing tables with marker rows that contain more than UINT16_MAX columns.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/advisories/GHSA-fmx4-26r3-wxpf
Source: disclosure@vulncheck.com
Third Party Advisory
https://vulncheck.com/advisories/vc-advisory-GHSA-fmx4-26r3-wxpf
Source: disclosure@vulncheck.com
Third Party Advisory
https://github.com/advisories/GHSA-fmx4-26r3-wxpf
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
https://github.com/gjtorikian/commonmarker/security/advisories/GHSA-fmx4-26r3-wxpf
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://vulncheck.com/advisories/vc-advisory-GHSA-fmx4-26r3-wxpf
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

10 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
7.1%
91th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

gjtorikian github