Improper Neutralization of Script in Attributes in a Web Page in draw.io - CVE-2026-46642

 

Improper Neutralization of Script in Attributes in a Web Page in draw.io - CVE-2026-46642

Published: May 16, 2026


Vulnerability identifier: #VU131602
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2026-46642
CWE-ID: CWE-83
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: JGraph
Affected software:
draw.io

Detailed vulnerability description

The vulnerability allows a remote attacker to execute arbitrary JavaScript in the editor's origin.

The vulnerability exists due to improper neutralization of script in attributes in the Text Format panel feature-detection routine in Format.js when opening a crafted .drawio file. A remote attacker can trick the victim into opening a crafted file to execute arbitrary JavaScript in the editor's origin.

Exploitation occurs when the imported file causes a cell to be selected, which automatically triggers the vulnerable code path. In same-origin embedded deployments, the script may run in the host application's origin.


How to mitigate CVE-2026-46642

Install security update from vendor's website.

Sources