| CVE ID | CVE-2026-7182 |
| Publication date | 15 May 2026 |
| Vendor | DHTMLX |
| Product | Diagram |
| Vulnerable versions | From 1.0.0 to 1.1.1 |
| Vulnerability type (CWE) | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22) |
| Report source | Report to CERT Polska |
| CVE ID | CVE-2026-41552 |
| Publication date | 15 May 2026 |
| Vendor | DHTMLX |
| Product | PDF Export Module |
| Vulnerable versions | From 0.3.3 to 0.7.6 |
| Vulnerability type (CWE) | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22) |
| Report source | Report to CERT Polska |
| CVE ID | CVE-2026-41553 |
| Publication date | 15 May 2026 |
| Vendor | DHTMLX |
| Product | PDF Export Module |
| Vulnerable versions | From 0.3.3 to 0.7.6 |
| Vulnerability type (CWE) | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78) |
| Report source | Report to CERT Polska |
Description
CERT Polska has received a report about vulnerabilities in DHTMLX software and participated in coordination of their disclosure.
The vulnerability CVE-2026-7182: Diagram's export module is vulnerable to Path Traversal in src attribute due to lack of HTML sanitization. An unauthenticated user could craft the html payload which could include local files from the server and display them in the generated pdf.
The vulnerability CVE-2026-41552: PDF Export Module used in DHTMLX's products Gantt and Scheduler is vulnerable to Path Traversal due to lack of HTML sanitization. An unauthenticated user could craft the html payload which could include local files from the server and display them in the generated PDF.
The vulnerability CVE-2026-41553: PDF Export Module used in DHTMLX's products Gantt and Scheduler is vulnerable to Remote Code Execution due to lack of data parameter sanitization. An unauthenticated attacker can inject the malicious JavaScript code to the parameter whose value is processed by Node.js and subsequently executed. This can lead to server compromise.
Vulnerability CVE-2026-7182 was fixed in Diagram version 1.1.1. Vulnerabilities CVE-2026-41552 and CVE-2026-41553 were fixed in PDF Export Module version 0.7.6.
Credits
We thank Łukasz Jaworski and Tomasz Holeksa from Pentest Limited for the responsible vulnerability report.
More about the coordinated vulnerability disclosure process at CERT Polska can be found at https://cert.pl/en/cvd/.