No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 13 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 09 May 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jgraph
Jgraph drawio |
|
| Vendors & Products |
Jgraph
Jgraph drawio |
Fri, 08 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | draw.io is a configurable diagramming and whiteboarding application. Prior to version 29.7.9, the draw.io client accepts a ?gitlab= URL parameter that overrides the GitLab server URL used during OAuth sign-in. A crafted link causes the user's click on draw.io's "Authorize in GitLab" dialog to open a popup on the attacker-controlled host instead of gitlab.com. This can lead to credential fishing and session state token exfiltration. This issue has been patched in version 29.7.9. | |
| Title | Unvalidated gitlab URL parameter redirects OAuth authorize step to attacker-controlled host | |
| Weaknesses | CWE-200 CWE-601 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T17:47:31.482Z
Reserved: 2026-04-25T01:53:21.584Z
Link: CVE-2026-42195
Updated: 2026-05-13T17:47:26.304Z
Status : Deferred
Published: 2026-05-08T22:16:31.410
Modified: 2026-05-12T16:45:18.893
Link: CVE-2026-42195
No data.
OpenCVE Enrichment
Updated: 2026-05-08T23:45:20Z