CVE-2024-14010
Unknown Unknown - Not Provided
Command Injection in Typora 1.7.4 PDF Export Enables RCE

Publication date: 2025-12-12

Last updated on: 2025-12-12

Assigner: VulnCheck

Description
Typora 1.7.4 contains a command injection vulnerability in the PDF export preferences that allows attackers to execute arbitrary system commands. Attackers can inject malicious commands into the 'run command' input field during PDF export to achieve remote code execution.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-12
Last Modified
2025-12-12
Generated
2026-05-07
AI Q&A
2025-12-12
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
typora typora 1.7.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

Typora 1.7.4 has a command injection vulnerability in its PDF export preferences. This means attackers can input malicious commands into the 'run command' field during PDF export, which the software then executes, allowing remote code execution on the system.


How can this vulnerability impact me? :

This vulnerability can allow attackers to execute arbitrary system commands remotely on your device, potentially leading to unauthorized access, data theft, system compromise, or further malware installation.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if Typora version 1.7.4 is installed and if the PDF export preferences have the 'run command' option enabled. Specifically, you can verify if the 'run command' input field is used during PDF export. Since the exploit involves injecting commands into this field, monitoring for unusual command executions triggered by Typora during PDF export can help detect exploitation attempts. There are no specific network commands provided, but locally, you can check the Typora preferences under File > Preferences > Export > PDF to see if the 'run command' option is enabled and inspect the input field for suspicious commands. Additionally, monitoring system logs for unexpected command executions originating from Typora processes may help detect exploitation. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include disabling the 'run command' option in the PDF export preferences of Typora 1.7.4 to prevent command injection. If possible, avoid using Typora version 1.7.4 until a patched version is released. Restrict local access to the system to trusted users only, as the vulnerability requires local access to exploit. Monitoring and restricting the execution of arbitrary commands from Typora can also help mitigate risk. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart