Fix marked — CVE-2022-21681 HIGH
Fix CVE-2022-21681 (HIGH) in marked for npm. Paste your package.json into PackageFix and get a patched version — no CLI, no signup. Redos in markdown parsing.
⚠ Vulnerability
CVE-2022-21681 (HIGH) — ReDoS in markdown parsing in marked versions below 9.1.6.
Vulnerable Version — package.json
"marked": "4.3.0"
Fixed Version — package.json
"marked": "9.1.6"
✓ Fix
Update marked to 9.1.6 or later. Run npm install to apply. Verify with your ecosystem's audit tool after updating.
Paste your manifest — get back a fixed version with all CVEs patched in seconds.
Open PackageFix →No signup · No CLI · No GitHub connection · Runs 100% in your browser
CVE Details
| Field | Value |
|---|---|
| CVE ID | CVE-2022-21681 |
| Severity | HIGH |
| Package | marked (npm) |
| Vulnerable versions | Below 9.1.6 |
| Safe version | 9.1.6 |
| CISA KEV | — |
| Description | Redos in markdown parsing |
Frequently Asked Questions
What is CVE-2022-21681?
CVE-2022-21681 is a HIGH severity vulnerability in marked (npm). It allows ReDoS in markdown parsing. Update to version 9.1.6 or later to fix it.
How do I fix CVE-2022-21681 in marked?
Update marked to version 9.1.6 in your package.json. Run npm install after updating to apply the fix.
Is CVE-2022-21681 being actively exploited?
Check the live CISA KEV catalog at packagefix.dev — PackageFix always reflects the current KEV status.
How do I check if I am affected by CVE-2022-21681?
Paste your package.json into PackageFix. If your installed version of marked is below 9.1.6, you are affected. PackageFix shows the exact CVE ID and fix version.
What search queries does this page target?
This page covers: marked CVE, marked XSS, marked vulnerability fix.