Vulnerability Description
drawnix is an all in one open-source whiteboard tool. In drawnix versions through 0.2.1, a cross-site scripting (XSS) vulnerability exists in the debug logging functionality. User controlled content is inserted directly into the DOM via innerHTML without sanitization when the global function __drawnix__web__console is invoked, as shown in apps/web/src/app/app.tsx where div.innerHTML = value is executed. This can allow arbitrary JavaScript execution in the context of the application if an attacker can cause untrusted data to be passed to the debug logger (for example via a malicious extension or other injection vector), potentially exposing user data or enabling unauthorized actions. The issue is fixed in version 0.3.0. Updating to 0.3.0 or later is recommended. No known workarounds exist.
Related Weaknesses (CWE)
References
- https://github.com/plait-board/drawnix/commit/92536e63c1adcc509ac51fdd439d4794c8
- https://github.com/plait-board/drawnix/security/advisories/GHSA-cq57-q8hg-xhxf
FAQ
What is CVE-2025-58172?
CVE-2025-58172 is a documented vulnerability. drawnix is an all in one open-source whiteboard tool. In drawnix versions through 0.2.1, a cross-site scripting (XSS) vulnerability exists in the debug logging functionality. User controlled content i...
How severe is CVE-2025-58172?
CVSS scoring is not yet available for CVE-2025-58172. Check NVD for updates.
Is there a patch for CVE-2025-58172?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.