Improper path handling in Obsidian desktop before 1.2.8 on Windows, Linux and macOS allows a crafted webpage to access local files and exfiltrate them to remote web servers via “app://local/<absolute-path>”. This vulnerability can be exploited if a user opens a malicious markdown file in Obsidian, or copies text from a malicious webpage and paste it into Obsidian.
More Stories
digikam-8.6.0-4.fc40
FEDORA-2025-97687e7f68 Packages in this update: digikam-8.6.0-4.fc40 Update description: update internal Libraw to 2025/03/17 snapshot Read More
digikam-8.6.0-4.fc41
FEDORA-2025-5bbbb2df79 Packages in this update: digikam-8.6.0-4.fc41 Update description: update internal Libraw to 2025/03/17 snapshot Read More
digikam-8.6.0-4.fc42
FEDORA-2025-1c1e378468 Packages in this update: digikam-8.6.0-4.fc42 Update description: update internal Libraw to 2025/03/17 snapshot Read More
epiphany-47.5-1.fc41
FEDORA-2025-164c668d6a Packages in this update: epiphany-47.5-1.fc41 Update description: Update to 47.5, notably fixing CVE-2025-3839 Read More
epiphany-48.1-1.fc42
FEDORA-2025-efbe201596 Packages in this update: epiphany-48.1-1.fc42 Update description: Update to 48.1, notably fixing CVE-2025-3839 Read More
icecat-115.22.0-2.rh1.fc42
FEDORA-2025-17f64d2c4d Packages in this update: icecat-115.22.0-2.rh1.fc42 Update description: Rebuild with pregenerated cbindgen Read More