Description
Diagram's export module is vulnerable to Path Traversal in src attribute due to lack of HTML sanitization. An unauthenticated user could craft the html payload which could include
local files from the server and display them in the generated pdf.

This issue was fixed in version 1.1.1.
Published: 2026-05-15
Score: 9.2 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a path traversal flaw in DHTMLX Diagram’s export module. Because the component does not sanitize the src attribute in the generated HTML, an unauthenticated user can embed a reference to a local file in a crafted payload. When the diagram is exported to PDF, the engine loads that file and embeds its contents into the resulting PDF, enabling disclosure of arbitrary files from the server.

Affected Systems

Affected product is DHTMLX:Diagram. Versions prior to 1.1.1 are vulnerable. The problem was fixed in 1.1.1.

Risk and Exploitability

With a CVSS score of 9.2, the vulnerability poses a serious risk. The attack vector is likely file inclusion through the web interface that offers the export feature, and no authentication is required, so any visitor can exploit it. EPSS score is not available, but the high CVSS and lack of mitigation suggest that exploitation could be attempted quickly. The vulnerability is not currently listed in CISA KEV, but its severity warrants immediate attention.

Generated by OpenCVE AI on May 15, 2026 at 15:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to DHTMLX Diagram version 1.1.1 or newer, which addresses the path traversal issue.
  • Restrict access to the export function to authenticated and authorized users to reduce exposure.
  • Configure a web application firewall or equivalent to block or sanitize src attributes containing path‑traversal sequences such as "../".

Generated by OpenCVE AI on May 15, 2026 at 15:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 13:00:00 +0000

Type Values Removed Values Added
Description Diagram's export module is vulnerable to Path Traversal in src attribute due to lack of HTML sanitization. An unauthenticated user could craft the html payload which could include local files from the server and display them in the generated pdf. This issue was fixed in version 1.1.1.
Title Path Traversal in Diagram
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published:

Updated: 2026-05-15T13:20:15.866Z

Reserved: 2026-04-27T09:40:36.655Z

Link: CVE-2026-7182

cve-icon Vulnrichment

Updated: 2026-05-15T13:20:12.014Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-15T13:16:19.250

Modified: 2026-05-15T14:56:18.253

Link: CVE-2026-7182

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T15:15:46Z

Weaknesses