Org Mode GNU Org Mode

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in GNU Org Mode.

By the Year

In 2026 there have been 0 vulnerabilities in GNU Org Mode. Org Mode did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 4 0.00
2023 1 7.80

It may take a day or so for new Org Mode vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent GNU Org Mode Security Vulnerabilities

Org Mode remote file trust in Emacs <29.3 / <9.6.23
CVE-2024-30205 - March 25, 2024

In Emacs before 29.3, Org mode considers contents of remote files to be trusted. This affects Org Mode before 9.6.23.

Emacs <=29.2: Default LaTeX Preview in email attachments triggers code exec
CVE-2024-30204 - March 25, 2024

In Emacs before 29.3, LaTeX preview is enabled by default for e-mail attachments.

GNU Emacs Gnus Inline MIME Trust Bypass before 29.3
CVE-2024-30203 - March 25, 2024

In Emacs before 29.3, Gnus treats inline MIME contents as trusted.

Emacs<=29.3 Org Mode XSS: Eval arbitrary Lisp code before 9.6.23
CVE-2024-30202 - March 25, 2024

In Emacs before 29.3, arbitrary Lisp code is evaluated as part of turning on Org mode. This affects Org Mode before 9.6.23.

Org Mode 9.6.1 Shell Metachar Abuse in ob-latex Execute
CVE-2023-28617 7.8 - High - March 19, 2023

org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.

Shell injection

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for GNU Org Mode or by GNU? Click the Watch button to subscribe.

GNU
Vendor

GNU Org Mode
Product

subscribe