{"id":"CVE-2021-20727","details":"Cross-site scripting vulnerability in Zettlr from 0.20.0 to 1.8.8 allows an attacker to execute an arbitrary script by loading a file or code snippet containing an invalid iframe into Zettlr.","modified":"2026-04-02T06:48:14.688894Z","published":"2021-05-27T09:15:07.533Z","references":[{"type":"WEB","url":"https://www.zettlr.com/"},{"type":"ADVISORY","url":"https://jvn.jp/en/jp/JVN98239374/index.html"},{"type":"ADVISORY","url":"https://github.com/Zettlr/Zettlr"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/zettlr/zettlr","events":[{"introduced":"3beb5ccc97da020b1b48a256c1cfd1a146514710"},{"last_affected":"4d72f9c9c7f3703c850996ad3142336c61fa4f3c"}],"database_specific":{"versions":[{"introduced":"0.20.0"},{"last_affected":"1.8.8"}]}}],"versions":["1.8.0","1.8.0-alpha.1","1.8.0-alpha.2","1.8.0-alpha.3","1.8.0-beta","1.8.0-beta.1","1.8.0-beta.2","1.8.0-beta.3","1.8.0-beta.4","v0.20.0","v1.0.0","v1.1.0","v1.2.0","v1.2.0-beta","v1.2.0-beta.1","v1.2.1","v1.2.2","v1.2.3","v1.3.0","v1.3.0-alpha","v1.3.0-beta","v1.3.0-beta.1","v1.3.0-beta.2","v1.4.0","v1.4.0-beta","v1.4.0-beta.1","v1.4.0-beta.2","v1.4.1","v1.4.2","v1.4.3","v1.5.0","v1.5.0-beta","v1.5.0-beta.1","v1.5.0-beta.2","v1.6.0","v1.6.0-beta","v1.6.0-beta.1","v1.6.0-beta.2","v1.6.0-beta.3","v1.6.0-beta.4","v1.6.0-beta.5","v1.7.0","v1.7.0-beta","v1.7.0-beta.1","v1.7.0-beta.10","v1.7.0-beta.11","v1.7.0-beta.12","v1.7.0-beta.13","v1.7.0-beta.2","v1.7.0-beta.3","v1.7.0-beta.4","v1.7.0-beta.5","v1.7.0-beta.6","v1.7.0-beta.7","v1.7.0-beta.8","v1.7.0-beta.9","v1.7.1","v1.7.2","v1.7.3","v1.7.4","v1.7.5","v1.8.0","v1.8.0-alpha","v1.8.1","v1.8.2","v1.8.3","v1.8.4","v1.8.5","v1.8.6","v1.8.7","v1.8.8"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-20727.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}