CVE-2026-0858: Stored XSS in net.sourceforge.plantuml:plantuml
CVE-2026-0858 is a medium severity stored cross-site scripting (XSS) vulnerability affecting net. sourceforge. plantuml:plantuml versions before 1. 2026. 0. The flaw arises from insufficient sanitization of interactive attributes in GraphViz diagrams embedded within PlantUML diagrams. An attacker can craft a malicious PlantUML diagram that injects JavaScript into the generated SVG output. When applications render these SVGs, the malicious script executes in the context of the user’s browser, potentially leading to session hijacking, data theft, or other malicious actions. Exploitation does not require authentication but does require user interaction to view the malicious SVG. No known exploits are currently reported in the wild.
AI Analysis
Technical Summary
CVE-2026-0858 is a stored cross-site scripting (XSS) vulnerability identified in the PlantUML package (net.sourceforge.plantuml:plantuml) prior to version 1.2026.0. PlantUML is a popular tool used to generate diagrams from plain text descriptions, often leveraging GraphViz for layout and SVG for output. The vulnerability stems from inadequate sanitization of interactive attributes within GraphViz diagrams embedded in PlantUML files. Specifically, crafted PlantUML diagrams can include malicious JavaScript payloads within SVG outputs. When these SVGs are rendered by applications or web interfaces that incorporate PlantUML-generated diagrams, the embedded scripts execute in the user’s browser context. This can lead to arbitrary script execution, enabling attackers to perform actions such as stealing cookies, session tokens, or performing actions on behalf of the user. The CVSS 4.0 score is 5.1 (medium severity), reflecting network attack vector, low complexity, no privileges required, but requiring user interaction and limited impact on integrity. The vulnerability does not require authentication, increasing its risk in environments where untrusted users can submit PlantUML diagrams or where diagrams are shared externally. No public exploits have been reported yet, but the potential for abuse exists especially in collaborative or documentation-heavy environments. The vulnerability was published on January 16, 2026, and users are advised to upgrade to version 1.2026.0 or later where the issue is addressed.
Potential Impact
For European organizations, the impact of CVE-2026-0858 can be significant in environments where PlantUML is used for generating and sharing diagrams, such as software development teams, technical documentation, and collaborative platforms. Exploitation could lead to unauthorized script execution in users’ browsers, resulting in session hijacking, data leakage, or unauthorized actions within web applications that render these SVGs. This risk is heightened in organizations that allow external contributors to submit PlantUML diagrams or where diagrams are embedded in internal portals accessible by multiple users. Confidentiality could be compromised if sensitive session tokens or credentials are stolen. Integrity of user sessions and availability of services could also be indirectly affected if attackers leverage the XSS to perform further attacks such as phishing or malware delivery. Although no known exploits exist currently, the medium severity score and ease of exploitation without authentication mean that organizations should act proactively to prevent potential attacks. The vulnerability could also undermine trust in documentation and collaboration tools if exploited.
Mitigation Recommendations
European organizations should immediately upgrade PlantUML to version 1.2026.0 or later, where the vulnerability is fixed. Until upgrades are fully deployed, organizations should implement strict input validation and sanitization on any user-submitted PlantUML diagrams, especially those that generate SVG outputs. Restrict diagram submission privileges to trusted users only and avoid rendering untrusted diagrams in web contexts without proper sandboxing. Employ Content Security Policy (CSP) headers to limit the execution of inline scripts and reduce the impact of potential XSS payloads. Additionally, monitor logs and user reports for unusual behavior related to diagram rendering. Educate users about the risks of interacting with untrusted diagrams and encourage reporting of suspicious content. For web applications embedding PlantUML-generated SVGs, consider rendering diagrams server-side to static images or using safer output formats until the vulnerability is fully mitigated. Regularly review and update security policies related to third-party tools and diagram sharing platforms.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2026-0858: Stored XSS in net.sourceforge.plantuml:plantuml
Description
CVE-2026-0858 is a medium severity stored cross-site scripting (XSS) vulnerability affecting net. sourceforge. plantuml:plantuml versions before 1. 2026. 0. The flaw arises from insufficient sanitization of interactive attributes in GraphViz diagrams embedded within PlantUML diagrams. An attacker can craft a malicious PlantUML diagram that injects JavaScript into the generated SVG output. When applications render these SVGs, the malicious script executes in the context of the user’s browser, potentially leading to session hijacking, data theft, or other malicious actions. Exploitation does not require authentication but does require user interaction to view the malicious SVG. No known exploits are currently reported in the wild.
AI-Powered Analysis
Technical Analysis
CVE-2026-0858 is a stored cross-site scripting (XSS) vulnerability identified in the PlantUML package (net.sourceforge.plantuml:plantuml) prior to version 1.2026.0. PlantUML is a popular tool used to generate diagrams from plain text descriptions, often leveraging GraphViz for layout and SVG for output. The vulnerability stems from inadequate sanitization of interactive attributes within GraphViz diagrams embedded in PlantUML files. Specifically, crafted PlantUML diagrams can include malicious JavaScript payloads within SVG outputs. When these SVGs are rendered by applications or web interfaces that incorporate PlantUML-generated diagrams, the embedded scripts execute in the user’s browser context. This can lead to arbitrary script execution, enabling attackers to perform actions such as stealing cookies, session tokens, or performing actions on behalf of the user. The CVSS 4.0 score is 5.1 (medium severity), reflecting network attack vector, low complexity, no privileges required, but requiring user interaction and limited impact on integrity. The vulnerability does not require authentication, increasing its risk in environments where untrusted users can submit PlantUML diagrams or where diagrams are shared externally. No public exploits have been reported yet, but the potential for abuse exists especially in collaborative or documentation-heavy environments. The vulnerability was published on January 16, 2026, and users are advised to upgrade to version 1.2026.0 or later where the issue is addressed.
Potential Impact
For European organizations, the impact of CVE-2026-0858 can be significant in environments where PlantUML is used for generating and sharing diagrams, such as software development teams, technical documentation, and collaborative platforms. Exploitation could lead to unauthorized script execution in users’ browsers, resulting in session hijacking, data leakage, or unauthorized actions within web applications that render these SVGs. This risk is heightened in organizations that allow external contributors to submit PlantUML diagrams or where diagrams are embedded in internal portals accessible by multiple users. Confidentiality could be compromised if sensitive session tokens or credentials are stolen. Integrity of user sessions and availability of services could also be indirectly affected if attackers leverage the XSS to perform further attacks such as phishing or malware delivery. Although no known exploits exist currently, the medium severity score and ease of exploitation without authentication mean that organizations should act proactively to prevent potential attacks. The vulnerability could also undermine trust in documentation and collaboration tools if exploited.
Mitigation Recommendations
European organizations should immediately upgrade PlantUML to version 1.2026.0 or later, where the vulnerability is fixed. Until upgrades are fully deployed, organizations should implement strict input validation and sanitization on any user-submitted PlantUML diagrams, especially those that generate SVG outputs. Restrict diagram submission privileges to trusted users only and avoid rendering untrusted diagrams in web contexts without proper sandboxing. Employ Content Security Policy (CSP) headers to limit the execution of inline scripts and reduce the impact of potential XSS payloads. Additionally, monitor logs and user reports for unusual behavior related to diagram rendering. Educate users about the risks of interacting with untrusted diagrams and encourage reporting of suspicious content. For web applications embedding PlantUML-generated SVGs, consider rendering diagrams server-side to static images or using safer output formats until the vulnerability is fully mitigated. Regularly review and update security policies related to third-party tools and diagram sharing platforms.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- snyk
- Date Reserved
- 2026-01-12T09:57:41.760Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6969c8f27c726673b6f36687
Added to database: 1/16/2026, 5:13:22 AM
Last enriched: 1/16/2026, 5:27:42 AM
Last updated: 1/16/2026, 6:22:23 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0975: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Delta Electronics DIAView
HighCVE-2026-23769: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in NAVER lucy-xss-filter
UnknownCVE-2026-23768: CWE-918 Server-Side Request Forgery (SSRF) in NAVER lucy-xss-filter
UnknownCVE-2026-1000: CWE-862 Missing Authorization in mailerlite MailerLite – WooCommerce integration
MediumCVE-2025-15527: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in brechtvds WP Recipe Maker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.