Theme Vulnerability Hub
Theme 1 known issue Latest disclosed Aug 09, 2024

MDx Vulnerabilities

Review known vulnerability records for the WordPress theme MDx (`mdx`), including severity, CVE references, affected versions, and patch status.

Recent tracked CVEs on this page include CVE-2024-6639, so operators can jump from disclosure to patch validation without scanning the full feed first.

Known Records
1
High or Critical
0
Patch Coverage
100%
Last Updated
Aug 12, 2024
Priority CVE Quick Links

Fast paths into MDx CVE reports

Start with the highest-signal CVE records for this WordPress theme before scanning the full vulnerability feed.

Indexed CVEs
1
Coverage Snapshot

What this page helps you verify fast

This hub clusters every indexed record for MDx so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.

Patch Visibility
1 record include a published patch path, leaving 0 with no listed safe release yet.
Severity Mix
0 critical and 0 high severity findings.
Recent CVEs
CVE-2024-6639
Reference Workflow
Jump from the hub into the full report when you need remediation notes, exploit context, CVSS vectors, or source references.
Triage First

Open the records most likely to drive action

These recent records surface the CVE strings, patch cues, and direct report links most operators need first.

Known Vulnerabilities

Reports for MDx

Sorted by latest disclosure date so newly published issues surface first.

Theme Medium Patched: Yes CVE-2024-6639
CVE-2024-6639: MDx <= 2.0.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via mdx_list_item Shortcode

The MDx theme for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mdx_list_item' shortcode in all versions up to, and including, 2.0.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authe...

Published
Aug 09, 2024
Patched Release
2.0.4
Affected Versions
Versions up to 2.0.3
Next Step
Update to 2.0.4 or newer if supported.