{"url":"http://public2.vulnerablecode.io/api/packages/720671?format=json","purl":"pkg:npm/mermaid@10.0.1-rc.5","type":"npm","namespace":"","name":"mermaid","version":"10.0.1-rc.5","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"10.9.4","latest_non_vulnerable_version":"11.10.0","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/12356?format=json","vulnerability_id":"VCID-fwuk-z3uk-1ygf","summary":"Prototype pollution vulnerability found in Mermaid's bundled version of DOMPurify\nThe following bundled files within the Mermaid NPM package contain a bundled version of DOMPurify that is vulnerable to https://github.com/cure53/DOMPurify/security/advisories/GHSA-mmhx-hmjr-r674, potentially resulting in an XSS attack.\n\nThis affects the built:\n\n- `dist/mermaid.min.js`\n- `dist/mermaid.js`\n- `dist/mermaid.esm.mjs`\n- `dist/mermaid.esm.min.mjs`\n\nThis will also affect users that use the above files via a CDN link, e.g. `https://cdn.jsdelivr.net/npm/mermaid@10.9.2/dist/mermaid.min.js`\n\n**Users that use the default NPM export of `mermaid`, e.g. `import mermaid from 'mermaid'`, or the `dist/mermaid.core.mjs` file, do not use this bundled version of DOMPurify, and can easily update using their package manager with something like `npm audit fix`.**\n\n### Patches\n\n- `develop` branch: 6c785c93166c151d27d328ddf68a13d9d65adc00\n- backport to v10: 92a07ffe40aab2769dd1c3431b4eb5beac282b34","references":[{"reference_url":"https://github.com/cure53/DOMPurify/security/advisories/GHSA-mmhx-hmjr-r674","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/cure53/DOMPurify/security/advisories/GHSA-mmhx-hmjr-r674"},{"reference_url":"https://github.com/mermaid-js/mermaid","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/mermaid-js/mermaid"},{"reference_url":"https://github.com/mermaid-js/mermaid/commit/6c785c93166c151d27d328ddf68a13d9d65adc00","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/mermaid-js/mermaid/commit/6c785c93166c151d27d328ddf68a13d9d65adc00"},{"reference_url":"https://github.com/mermaid-js/mermaid/commit/92a07ffe40aab2769dd1c3431b4eb5beac282b34","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/mermaid-js/mermaid/commit/92a07ffe40aab2769dd1c3431b4eb5beac282b34"},{"reference_url":"https://github.com/mermaid-js/mermaid/security/advisories/GHSA-m4gq-x24j-jpmf","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/mermaid-js/mermaid/security/advisories/GHSA-m4gq-x24j-jpmf"},{"reference_url":"https://github.com/advisories/GHSA-m4gq-x24j-jpmf","reference_id":"GHSA-m4gq-x24j-jpmf","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-m4gq-x24j-jpmf"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/43983?format=json","purl":"pkg:npm/mermaid@10.9.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-q79q-8yzx-p3f6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/mermaid@10.9.3"},{"url":"http://public2.vulnerablecode.io/api/packages/570776?format=json","purl":"pkg:npm/mermaid@11.0.0-alpha.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-q79q-8yzx-p3f6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/mermaid@11.0.0-alpha.1"}],"aliases":["GHSA-m4gq-x24j-jpmf"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fwuk-z3uk-1ygf"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/mermaid@10.0.1-rc.5"}