Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. mermaid
  4. ›
  5. CVE-2025-54880

CVE-2025-54880: Mermaid does not properly sanitize architecture diagram iconText leading to XSS

August 19, 2025 (updated August 20, 2025)

In the default configuration of mermaid 11.9.0, user supplied input for architecture diagram icons is passed to the d3 html() method, creating a sink for cross site scripting.

References

  • github.com/advisories/GHSA-8gwm-58g9-j8pw
  • github.com/mermaid-js/mermaid
  • github.com/mermaid-js/mermaid/commit/2aa83302795183ea5c65caec3da1edd6cb4791fc
  • github.com/mermaid-js/mermaid/commit/734bde38777c9190a5a72e96421c83424442d4e4
  • github.com/mermaid-js/mermaid/security/advisories/GHSA-8gwm-58g9-j8pw
  • nvd.nist.gov/vuln/detail/CVE-2025-54880

Code Behaviors & Features

Detect and mitigate CVE-2025-54880 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 11.1.0 before 11.10.0

Fixed versions

  • 11.10.0

Solution

Upgrade to version 11.10.0 or above.

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

npm/mermaid/CVE-2025-54880.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 23 Aug 2025 00:19:49 +0000.