Follow @Openwall on Twitter for new release announcements and other news
[<prev] [day] [month] [year] [list]
Message-ID: <08ab9b2f-39ff-4f80-d415-bf6bd32d86a7@apache.org>
Date: Sat, 23 May 2026 04:29:15 +0000
From: Zhongxiang Wang <wangzx@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2026-45249: Apache ECharts: XSS in Lines series tooltip
 rendering 

Severity: important 

Affected versions:

- Apache ECharts (echarts) before 6.1.0

Description:

A cross-site scripting (XSS) vulnerability exists in Apache ECharts in the Lines series tooltip rendering logic.




This issue affects Apache ECharts: from before 6.1.0.

In versions prior to 6.1.0, if both Lines series and tooltip are used, and no user-specified tooltip.formatter is provided, and series.data[i].name is specified, raw HTML string series.data[i].name can be rendered through innerHTML sink into tooltip content. Although tooltip is allowed to accept user-provided raw HTML via a custom tooltip.formatter, the built-in tooltip formatters conventionally perform HTML escaping automatically. This case breaks that convention and may unexpectedly lead to script execution when tooltips are displayed.


Users are recommended to upgrade to version 6.1.0 if using the Lines series in this way, which fixes the issue.

Credit:

Lakshmikanthan K (finder)

References:

https://github.com/apache/echarts/pull/21608
https://echarts.apache.org/en/option.html#series-lines
https://echarts.apache.org/handbook/en/best-practices/security/#passing_raw_html_safely
https://echarts.apache.org
https://www.cve.org/CVERecord?id=CVE-2026-45249

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.