CVE-2026-42195
Unvalidated gitlab URL parameter redirects OAuth authorize step to attacker-controlled host
CVSS Score
3.4
EPSS Score
0.0%
EPSS Percentile
0th
draw.io is a configurable diagramming and whiteboarding application. Prior to version 29.7.9, the draw.io client accepts a ?gitlab= URL parameter that overrides the GitLab server URL used during OAuth sign-in. A crafted link causes the user's click on draw.io's "Authorize in GitLab" dialog to open a popup on the attacker-controlled host instead of gitlab.com. This can lead to credential fishing and session state token exfiltration. This issue has been patched in version 29.7.9.
| CWE | CWE-601 CWE-200 |
| Vendor | jgraph |
| Product | drawio |
| Published | May 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for jgraph drawio
Be the first to know when new low vulnerabilities affecting jgraph drawio are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
None
Availability
None
Affected Versions
jgraph / drawio
< 29.7.9