CVE-2025-58172

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-58172
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-58172.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-58172
Aliases
  • GHSA-cq57-q8hg-xhxf
Published
2025-09-15T17:15:35Z
Modified
2025-09-17T06:06:19.861328Z
Summary
[none]
Details

drawnix is an all in one open-source whiteboard tool. In drawnix versions through 0.2.1, a cross-site scripting (XSS) vulnerability exists in the debug logging functionality. User controlled content is inserted directly into the DOM via innerHTML without sanitization when the global function drawnixweb__console is invoked, as shown in apps/web/src/app/app.tsx where div.innerHTML = value is executed. This can allow arbitrary JavaScript execution in the context of the application if an attacker can cause untrusted data to be passed to the debug logger (for example via a malicious extension or other injection vector), potentially exposing user data or enabling unauthorized actions. The issue is fixed in version 0.3.0. Updating to 0.3.0 or later is recommended. No known workarounds exist.

References

Affected packages

Git / github.com/plait-board/drawnix

Affected ranges

Type
GIT
Repo
https://github.com/plait-board/drawnix
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.0.3

v0.*

v0.0.1
v0.0.2
v0.0.3
v0.0.4
v0.0.4-0
v0.0.4-1
v0.0.4-2
v0.0.4-3
v0.0.6
v0.1.0
v0.1.1
v0.1.2
v0.1.3
v0.1.4
v0.2.0
v0.2.1