CVE-2026-41149 PUBLISHED

Mermaid: Improper sanitization of `classDef` in state diagrams leads to HTML injection

Assigner: GitHub_M
Reserved: 17.04.2026 Published: 22.05.2026 Updated: 23.05.2026

Mermaid is a JavaScript tool that uses Markdown-inspired text to create and modify diagrams and charts. Versions 10.9.5 and earlier, as well as 11.0.0-alpha.1 through 11.14.0, are vulnerable to HTML injection under the default configuration. Specifically, the classDef directive in Mermaid state diagrams permits DOM injection that escapes the SVG context. However, <script> tags are stripped, which prevents cross-site scripting (XSS). This issue has been fixed in versions 10.9.6 and 11.15.0. If developers are unable to immediately upgrade, they can work around this issue by setting "securityLevel": "sandbox", which prevents the issue by rendering the mermaid diagram in a sandboxed <iframe>.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
CVSS Score: 5.3

Product Status

Vendor mermaid-js
Product mermaid
Versions
  • Version >= 11.0.0-alpha.1, < 11.15.0 is affected
  • Version < 10.9.6 is affected

References

Problem Types

  • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE