Versions of the package net.sourceforge.plantuml:plantuml before 1.2026.0 are vulnerable to Stored XSS due to insufficient sanitization of interactive attributes in GraphViz diagrams. As a result, a crafted PlantUML diagram can inject malicious JavaScript into generated SVG output, leading to arbitrary script execution in the context of applications that render the SVG.
References
| Link | Resource |
|---|---|
| https://github.com/plantuml/plantuml/commit/6826315db092d2e432aeab1a0894e08017c6e4bd | Patch |
| https://github.com/plantuml/plantuml/releases/tag/v1.2026.0 | Release Notes |
| https://security.snyk.io/vuln/SNYK-JAVA-NETSOURCEFORGEPLANTUML-14552230 | Vendor Advisory Patch |
Configurations
History
No history.
Information
Published : 2026-01-16 05:16
Updated : 2026-02-02 18:52
NVD link : CVE-2026-0858
Mitre link : CVE-2026-0858
CVE.ORG link : CVE-2026-0858
JSON object : View
Products Affected
plantuml
- plantuml
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
