PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-57798 laurent22 CVE debrief

CVE-2025-57798 is a denial-of-service issue in Joplin’s note title input handling. In versions 3.6.14 and earlier, an excessively long title can trigger out-of-memory conditions and terminate the application. The issue can be reached through the UI by a local user, or through Joplin’s local web service API if an attacker has a valid authentication token. The fix is included in Joplin 3.7.1.

Vendor
laurent22
Product
joplin
CVSS
MEDIUM 5.5
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-19
Original CVE updated
2026-05-20
Advisory published
2026-05-19
Advisory updated
2026-05-20

Who should care

Joplin users and administrators running version 3.6.14 or earlier should care, especially on endpoints where local users, malware, or stolen local API tokens are realistic threats. Because the impact is service termination rather than data corruption, this is most relevant for availability-sensitive desktop deployments.

Technical summary

The advisory describes a lack of proper length validation in title input processing. Supplying an excessively long string to the note title field can cause unbounded memory allocation, leading to an out-of-memory error and program termination. The NVD metadata classifies the issue as local, low-complexity, low-privilege, no-user-interaction, with high availability impact and no confidentiality or integrity impact (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). The source corpus also maps the weakness to CWE-770.

Defensive priority

Medium. Patch promptly on affected endpoints, but the primary risk is local availability disruption rather than remote compromise.

Recommended defensive actions

  • Upgrade Joplin to version 3.7.1 or later.
  • Review any workflows that expose or store Joplin local web service authentication tokens, and reduce token exposure where possible.
  • Treat the local Joplin API as sensitive on shared or malware-prone endpoints.
  • If running affected versions, avoid pasting untrusted extremely long content into note titles until patched.
  • Use the official GitHub advisory and commit references to confirm the remediation applied in your environment.

Evidence notes

The supplied source corpus states that Joplin versions 3.6.14 and prior are affected and that version 3.7.1 contains the patch. NVD metadata for this CVE lists vulnStatus as Deferred and provides CVSS vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, with CWE-770 as the associated weakness. The official GitHub advisory and commit are included as references in the source item.

Official resources

Published by the CVE record on 2026-05-19T21:16:40.817Z and modified on 2026-05-20T16:16:24.953Z, per the supplied timeline. This debrief uses those CVE dates and does not treat generation time as the issue date.