Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @excalidraw/mermaid-to-excalidraw
  4. ›
  5. GHSA-39h7-pwv7-rc3x

GHSA-39h7-pwv7-rc3x: Excalidraw vulnerable to XSS via Mermaid sequence diagram labels (KaTeX rendering)

April 24, 2026

@excalidraw/excalidraw@0.18.0 depends on a Mermaid conversion package version that resolves to a Mermaid release affected by CVE-2025-54881 / GHSA-7rqq-prvp-x9jh. User-supplied Mermaid sequence diagram labels could trigger XSS through Mermaid’s KaTeX label rendering path.

This is patched in @excalidraw/excalidraw@0.18.1 by updating @excalidraw/mermaid-to-excalidraw to 2.2.2, which uses a patched Mermaid 11 release.

Moderate severity as this XSS requires manual user action - pasting unsafe Mermaid diagram into the Excalidraw editor. No semi-automated attack vector exists by default (such as accessing a link).

References

  • github.com/advisories/GHSA-39h7-pwv7-rc3x
  • github.com/excalidraw/excalidraw
  • github.com/excalidraw/excalidraw/releases/tag/v0.18.1
  • github.com/excalidraw/excalidraw/security/advisories/GHSA-39h7-pwv7-rc3x
  • github.com/mermaid-js/mermaid/security/advisories/GHSA-7rqq-prvp-x9jh

Code Behaviors & Features

Detect and mitigate GHSA-39h7-pwv7-rc3x with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.3.0 before 1.1.3

Fixed versions

  • 1.1.3

Solution

Upgrade to version 1.1.3 or above.

Weakness

  • CWE-1395: Dependency on Vulnerable Third-Party Component
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

npm/@excalidraw/mermaid-to-excalidraw/GHSA-39h7-pwv7-rc3x.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:17:52 +0000.