Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 09 May 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jgraph
Jgraph drawio |
|
| Vendors & Products |
Jgraph
Jgraph drawio |
Fri, 08 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | draw.io is a configurable diagramming and whiteboarding application. Prior to version 29.7.9, the draw.io client accepts a ?gitlab= URL parameter that overrides the GitLab server URL used during OAuth sign-in. A crafted link causes the user's click on draw.io's "Authorize in GitLab" dialog to open a popup on the attacker-controlled host instead of gitlab.com. This can lead to credential fishing and session state token exfiltration. This issue has been patched in version 29.7.9. | |
| Title | Unvalidated gitlab URL parameter redirects OAuth authorize step to attacker-controlled host | |
| Weaknesses | CWE-200 CWE-601 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T17:47:31.482Z
Reserved: 2026-04-25T01:53:21.584Z
Link: CVE-2026-42195
Updated: 2026-05-13T17:47:26.304Z
Status : Deferred
Published: 2026-05-08T22:16:31.410
Modified: 2026-05-12T16:45:18.893
Link: CVE-2026-42195
No data.
OpenCVE Enrichment
Updated: 2026-05-08T23:45:20Z