Skip to content

[GHSA-cgmm-x5ww-q5cr] beautiful-mermaid contains an SVG attribute injection issue that can lead to cross-site scripting (XSS)#6929

Closed
cai0duque wants to merge 1 commit intocai0duque/advisory-improvement-6929from
cai0duque-GHSA-cgmm-x5ww-q5cr
Closed

[GHSA-cgmm-x5ww-q5cr] beautiful-mermaid contains an SVG attribute injection issue that can lead to cross-site scripting (XSS)#6929
cai0duque wants to merge 1 commit intocai0duque/advisory-improvement-6929from
cai0duque-GHSA-cgmm-x5ww-q5cr

Conversation

@cai0duque
Copy link

Updates

  • CVSS v4
  • CWEs
  • Description

Comments
Increased the Severity (CVSS) to Moderate. The previous assessment underestimated the Subsequent System Impact (SC/SI). Since this is a library likely used to render content in web applications, a successful XSS exploit allows an attacker to hijack user sessions (High Confidentiality impact) and perform actions on behalf of the user (High Integrity impact). Updated the description to explicitly mention the vectors (classDef/style directives).

Copilot AI review requested due to automatic review settings February 17, 2026 09:02
@github-actions github-actions bot changed the base branch from main to cai0duque/advisory-improvement-6929 February 17, 2026 09:03
Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This pull request updates a GitHub Security Advisory (GHSA-cgmm-x5ww-q5cr) for the beautiful-mermaid npm package (CVE-2026-26226), which contains an SVG attribute injection vulnerability leading to cross-site scripting (XSS). The update revises the CVSS v4 scoring to better reflect the impact on subsequent systems (applications using the library), adds CWE-116 to complement the existing CWE-79 classification, and rewrites the vulnerability description to be more specific about attack vectors and impacts.

Changes:

  • Updated CVSS v4 score to reflect high confidentiality and integrity impact on subsequent systems (applications using the library) instead of the vulnerable library itself
  • Added CWE-116 (Improper Encoding or Escaping of Output) alongside existing CWE-79 (XSS)
  • Rewrote description to explicitly mention attack vectors (classDef and style directives) and potential impacts (Account Takeover, session hijacking)

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

@shelbyc
Copy link
Contributor

shelbyc commented Feb 17, 2026

Hi @cai0duque, I'm closing the PR because I agree with the CVE description and CVSS provided by my peers at VulnCheck. The CVSS provided, CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N, is typical of cross-site scripting vulnerabilities and the CVE description VulnCheck provided is accurate.

@shelbyc shelbyc closed this Feb 17, 2026
@github-actions github-actions bot deleted the cai0duque-GHSA-cgmm-x5ww-q5cr branch February 17, 2026 21:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants

Comments