Ghostwire

CVE-2026-42195: draw.io is a configurable diagramming and whiteboarding application. Prior to version 29.7.9, the draw.io client accepts...

LOW CVSS 3.4 Exploit Available 2 PoC

Published: May 8, 2026 | Last Modified: May 8, 2026

Description

draw.io is a configurable diagramming and whiteboarding application. Prior to version 29.7.9, the draw.io client accepts a ?gitlab= URL parameter that overrides the GitLab server URL used during OAuth sign-in. A crafted link causes the user's click on draw.io's "Authorize in GitLab" dialog to open a popup on the attacker-controlled host instead of gitlab.com. This can lead to credential fishing and session state token exfiltration. This issue has been patched in version 29.7.9.

Ghostwire Analysis — What This Means Practically

This analysis is generated by Ghostwire from NVD, CISA KEV, EPSS, and open-source intelligence data. Verify findings through primary sources before acting.

Proof-of-Concept Exploits (2)

Security Coverage (1 articles)

References