CVE-2026-33311 PUBLISHED

@dicebear/core and @dicebear/initials Vulnerable to SVG Injection via Unsanitized Options

Assigner: GitHub_M
Reserved: 18.03.2026 Published: 24.03.2026 Updated: 24.03.2026

DiceBear is an avatar library for designers and developers. Starting in version 5.0.0 and prior to versions 5.4.4, 6.1.4, 7.1.4, 8.0.3, and 9.4.1, SVG attribute values derived from user-supplied options (backgroundColor, fontFamily, textColor) were not XML-escaped before interpolation into SVG output. This could allow Cross-Site Scripting (XSS) when applications pass untrusted input to createAvatar() and serve the resulting SVG inline or with Content-Type: image/svg+xml. Starting in versions 5.4.4, 6.1.4, 7.1.4, 8.0.3, and 9.4.1, all affected SVG attribute values are properly escaped using XML entity encoding. Users should upgrade to the listed patched versions. Some mitigating factors limit vulnerability. Applications that validate input against the library's JSON Schema before passing it to createAvatar() are not affected. The DiceBear CLI validates input via AJV and was not vulnerable. Exploitation requires that an application passes untrusted, unvalidated external input directly as option values.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS Score: 4.7

Product Status

Vendor dicebear
Product dicebear
Versions
  • Version >= 5.0.0, < 5.4.4 is affected
  • Version >= 6.0.0, < 6.1.4 is affected
  • Version >= 7.0.0, < 7.1.4 is affected
  • Version >= 8.0.0, < 8.0.3 is affected
  • Version >= 9.0.0, < 9.4.1 is affected

References

Problem Types

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE