Skip to main content

CVE-2022-3873: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jgraph jgraph/drawio

Medium
VulnerabilityCVE-2022-3873cvecve-2022-3873cwe-79
Published: Mon Nov 07 2022 (11/07/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: jgraph
Product: jgraph/drawio

Description

Cross-site Scripting (XSS) - DOM in GitHub repository jgraph/drawio prior to 20.5.2.

AI-Powered Analysis

AILast updated: 06/25/2025, 21:28:23 UTC

Technical Analysis

CVE-2022-3873 is a Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting the jgraph/drawio project prior to version 20.5.2. This vulnerability arises due to improper neutralization of input during web page generation, specifically a DOM-based XSS flaw. In this context, malicious input can be injected and executed within the victim's browser environment without proper sanitization or encoding. The vulnerability allows an attacker to execute arbitrary JavaScript code in the context of the affected web application, potentially leading to unauthorized actions such as session hijacking, defacement, or redirection to malicious sites. The CVSS v3.0 base score is 6.5 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact affects confidentiality and integrity but not availability. The vulnerability is present in the open-source jgraph/drawio diagramming tool, which is widely used for creating diagrams and flowcharts, often integrated into enterprise environments for documentation and collaboration. No known exploits in the wild have been reported, and no official patches are linked in the provided data, but the issue was addressed in version 20.5.2. The vulnerability is exploitable remotely without authentication or user interaction, increasing its risk profile in environments where drawio is deployed as a web-based tool or integrated into web portals.

Potential Impact

For European organizations, the impact of CVE-2022-3873 can be significant, especially for those relying on jgraph/drawio for internal or customer-facing diagramming solutions. Successful exploitation could lead to the compromise of user sessions, leakage of sensitive information, or unauthorized actions performed on behalf of legitimate users. This is particularly critical in sectors such as finance, healthcare, and government, where diagrams may contain sensitive architectural or process information. Additionally, since the vulnerability does not require user interaction or authentication, automated exploitation attempts could be feasible, increasing the risk of widespread attacks. The integrity of documentation and collaboration platforms could be undermined, potentially disrupting business processes and trust in internal tools. While availability is not directly impacted, the confidentiality and integrity breaches could lead to regulatory compliance issues under GDPR and other European data protection laws, resulting in legal and financial repercussions.

Mitigation Recommendations

European organizations should prioritize upgrading to jgraph/drawio version 20.5.2 or later, where the vulnerability has been addressed. In the absence of immediate patching, organizations should implement strict input validation and output encoding on any user-supplied data that is rendered within the application to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Regularly audit and monitor web application logs for suspicious activities indicative of exploitation attempts. If drawio is integrated into larger platforms, ensure that those platforms also sanitize and validate inputs appropriately. Additionally, restrict access to the drawio web interface to trusted networks or VPNs to limit exposure. Conduct user awareness training focused on recognizing phishing or social engineering attempts that might leverage this vulnerability. Finally, consider deploying web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting drawio endpoints.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntrdev
Date Reserved
2022-11-07T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.0
State
PUBLISHED

Threat ID: 682d9839c4522896dcbec814

Added to database: 5/21/2025, 9:09:13 AM

Last enriched: 6/25/2025, 9:28:23 PM

Last updated: 8/1/2025, 12:11:42 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats