6.1 CVE-2025-54880

Patch Exploit
 

Mermaid is a JavaScript based diagramming and charting tool that uses Markdown-inspired text definitions and a renderer to create and modify complex diagrams. In the default configuration of mermaid 11.9.0 and earlier, user supplied input for architecture diagram icons is passed to the d3 html() method, creating a sink for cross site scripting. This vulnerability is fixed in 11.10.0.
https://nvd.nist.gov/vuln/detail/CVE-2025-54880

Categories

CWE-79

References


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:mermaid_project:mermaid:*:*:*:*:*:node.js:*:* >= 11.1.0 < 11.10.0


REMEDIATION


Patch

Url
https://github.com/mermaid-js/mermaid/security/advisories/GHSA-8gwm-58g9-j8pw
https://github.com/mermaid-js/mermaid/commit/2aa83302795183ea5c65caec3da1edd6...
https://github.com/mermaid-js/mermaid/security/advisories/GHSA-8gwm-58g9-j8pw


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url

Other Nist (github, ...)

Url
https://github.com/mermaid-js/mermaid/security/advisories/GHSA-8gwm-58g9-j8pw
https://github.com/mermaid-js/mermaid/security/advisories/GHSA-8gwm-58g9-j8pw


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry