|
|
Message-ID: <08ab9b2f-39ff-4f80-d415-bf6bd32d86a7@apache.org> Date: Sat, 23 May 2026 04:29:15 +0000 From: Zhongxiang Wang <wangzx@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2026-45249: Apache ECharts: XSS in Lines series tooltip rendering Severity: important Affected versions: - Apache ECharts (echarts) before 6.1.0 Description: A cross-site scripting (XSS) vulnerability exists in Apache ECharts in the Lines series tooltip rendering logic. This issue affects Apache ECharts: from before 6.1.0. In versions prior to 6.1.0, if both Lines series and tooltip are used, and no user-specified tooltip.formatter is provided, and series.data[i].name is specified, raw HTML string series.data[i].name can be rendered through innerHTML sink into tooltip content. Although tooltip is allowed to accept user-provided raw HTML via a custom tooltip.formatter, the built-in tooltip formatters conventionally perform HTML escaping automatically. This case breaks that convention and may unexpectedly lead to script execution when tooltips are displayed. Users are recommended to upgrade to version 6.1.0 if using the Lines series in this way, which fixes the issue. Credit: Lakshmikanthan K (finder) References: https://github.com/apache/echarts/pull/21608 https://echarts.apache.org/en/option.html#series-lines https://echarts.apache.org/handbook/en/best-practices/security/#passing_raw_html_safely https://echarts.apache.org https://www.cve.org/CVERecord?id=CVE-2026-45249
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.