mermaid@7.0.4 vulnerabilities

Markdown-ish syntax for generating flowcharts, mindmaps, sequence diagrams, class diagrams, gantt charts, git graphs and more.

  • latest version

    11.12.1

  • latest non vulnerable version

  • first published

    10 years ago

  • latest version published

    11 hours ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the mermaid package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Cross-site Scripting (XSS)

    mermaid is a package for generation of diagrams and flowcharts from text in a similar manner as markdown.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Malicious diagrams can run javascript code at diagram readers' machines.

    How to fix Cross-site Scripting (XSS)?

    Upgrade mermaid to version 8.13.8 or higher.

    <8.13.8
    • M
    Cross-site Scripting (XSS)

    mermaid is a package for generation of diagrams and flowcharts from text in a similar manner as markdown.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when using the antiscript security setting.

    How to fix Cross-site Scripting (XSS)?

    Upgrade mermaid to version 8.11.0 or higher.

    <8.11.0
    • M
    Cross-site Scripting (XSS)

    mermaid is a package for generation of diagrams and flowcharts from text in a similar manner as markdown.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). If malicious input such as A["<img src=invalid onerror=alert('XSS')></img>"] is provided to the application, it will execute the code instead of rendering it as text due to improper output encoding.

    How to fix Cross-site Scripting (XSS)?

    Upgrade mermaid to version 8.2.3 or higher.

    <8.2.3