Wiz Agents & Workflows are here

CVE-2024-32472
JavaScript vulnerability analysis and mitigation

Overview

A stored XSS vulnerability was discovered in Excalidraw's web embeddable component, identified as CVE-2024-32472. The vulnerability affects versions >=0.16.0,<0.16.4 and >=0.17.0,<0.17.6 of the @excalidraw/excalidraw npm package. The issue was disclosed on April 17, 2024, and allows arbitrary JavaScript execution in the context of the domain where the editor is hosted (GitHub Advisory).

Technical details

The vulnerability stems from two distinct vectors: First, the component rendered untrusted strings as iframe's 'srcdoc' without proper HTML injection sanitization. Second, there was improper sanitization against attribute HTML injection. When combined with the 'allow-same-origin' sandbox flag, which was necessary for several embeds, this resulted in a cross-site scripting vulnerability. The issue has been assigned a CVSS v3.1 base score of 6.1 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N (NVD).

Impact

The vulnerability allows attackers to execute arbitrary JavaScript code in the context of the domain where the Excalidraw editor is hosted. This could potentially lead to unauthorized access to sensitive information, session hijacking, or other malicious actions within the context of the affected domain (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in versions 0.17.6 and 0.16.4. The fixes include no longer rendering unsafe srcdoc content verbatim, instead strictly parsing the supplied content and constructing the srcdoc manually. Additionally, proper sanitization has been implemented, and the 'allow-same-origin' flag is now only set in cases that require it, following the principle of least privilege (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-34156CRITICAL9.9
  • JavaScriptJavaScript
  • @nocobase/plugin-workflow-javascript
NoYesMar 30, 2026
CVE-2026-34363HIGH8.2
  • JavaScriptJavaScript
  • parse-server
NoYesMar 30, 2026
CVE-2026-33949HIGH8.1
  • JavaScriptJavaScript
  • @tinacms/graphql
NoYesMar 30, 2026
CVE-2026-34043MEDIUM5.9
  • JavaScriptJavaScript
  • serialize-javascript
NoYesMar 31, 2026
CVE-2026-34373MEDIUM5.3
  • JavaScriptJavaScript
  • parse-server
NoYesMar 30, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management