Vulnerability Description
Mermaid is a JavaScript based diagramming and charting tool that uses Markdown-inspired text definitions and a renderer to create and modify complex diagrams. In the default configuration of mermaid 11.9.0 and earlier, user supplied input for architecture diagram icons is passed to the d3 html() method, creating a sink for cross site scripting. This vulnerability is fixed in 11.10.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mermaid Project | Mermaid | >= 11.1.0, < 11.10.0 |
Related Weaknesses (CWE)
References
- https://github.com/mermaid-js/mermaid/commit/2aa83302795183ea5c65caec3da1edd6cb4Patch
- https://github.com/mermaid-js/mermaid/commit/734bde38777c9190a5a72e96421c8342444Product
- https://github.com/mermaid-js/mermaid/security/advisories/GHSA-8gwm-58g9-j8pwExploitPatchVendor Advisory
- https://github.com/mermaid-js/mermaid/security/advisories/GHSA-8gwm-58g9-j8pwExploitPatchVendor Advisory
FAQ
What is CVE-2025-54880?
CVE-2025-54880 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Mermaid is a JavaScript based diagramming and charting tool that uses Markdown-inspired text definitions and a renderer to create and modify complex diagrams. In the default configuration of mermaid 1...
How severe is CVE-2025-54880?
CVE-2025-54880 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-54880?
Check the references section above for vendor advisories and patch information. Affected products include: Mermaid Project Mermaid.