"TITLE":"Arbitrary Code Execution through Sanitizer Bypass in jgraph/drawio"
},
"affects":{
"vendor":{
"vendor_data":[
{
"product":{
"product_data":[
{
"product_name":"jgraph/drawio",
"version":{
"version_data":[
{
"version_affected":"<",
"version_value":"18.0.0"
}
]
}
}
]
},
"vendor_name":"jgraph"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
{
"lang":"eng",
"value":"Arbitrary Code Execution through Sanitizer Bypass in GitHub repository jgraph/drawio prior to 18.0.0. - Arbitrary (remote) code execution in the desktop app.\n- Stored XSS in the web app."