CVE-2024-14010
Command Injection in Typora 1.7.4 PDF Export Enables RCE
Publication date: 2025-12-12
Last updated on: 2025-12-12
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| typora | typora | 1.7.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
Typora 1.7.4 has a command injection vulnerability in its PDF export preferences. This means attackers can input malicious commands into the 'run command' field during PDF export, which the software then executes, allowing remote code execution on the system.
How can this vulnerability impact me? :
This vulnerability can allow attackers to execute arbitrary system commands remotely on your device, potentially leading to unauthorized access, data theft, system compromise, or further malware installation.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking if Typora version 1.7.4 is installed and if the PDF export preferences have the 'run command' option enabled. Specifically, you can verify if the 'run command' input field is used during PDF export. Since the exploit involves injecting commands into this field, monitoring for unusual command executions triggered by Typora during PDF export can help detect exploitation attempts. There are no specific network commands provided, but locally, you can check the Typora preferences under File > Preferences > Export > PDF to see if the 'run command' option is enabled and inspect the input field for suspicious commands. Additionally, monitoring system logs for unexpected command executions originating from Typora processes may help detect exploitation. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include disabling the 'run command' option in the PDF export preferences of Typora 1.7.4 to prevent command injection. If possible, avoid using Typora version 1.7.4 until a patched version is released. Restrict local access to the system to trusted users only, as the vulnerability requires local access to exploit. Monitoring and restricting the execution of arbitrary commands from Typora can also help mitigate risk. [1, 2]