CVE-2022-1815

7.5 HIGH

📋 TL;DR

CVE-2022-1815 is an information disclosure vulnerability in draw.io diagramming software that exposes sensitive information to unauthorized actors. The vulnerability allows attackers to access sensitive data that should be protected. This affects all users of draw.io versions prior to 18.1.2.

💻 Affected Systems

Products:
  • draw.io (diagrams.net)
Versions: All versions prior to 18.1.2
Operating Systems: All platforms (web application, desktop, integrations)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployment modes: web application, desktop versions, and embedded integrations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive diagram content, configuration data, or user information that should be protected, potentially leading to data breaches or intellectual property theft.

🟠

Likely Case

Unauthorized access to sensitive diagram data or configuration information that users expect to remain private.

🟢

If Mitigated

Minimal impact with proper access controls and network segmentation limiting exposure.

🌐 Internet-Facing: HIGH - Web applications exposing draw.io functionality could leak sensitive data to internet attackers.
🏢 Internal Only: MEDIUM - Internal applications could still expose sensitive organizational data to unauthorized internal users.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability appears to be an information exposure issue that could be exploited without authentication based on the CWE-200 classification and CVSS score.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 18.1.2 and later

Vendor Advisory: https://github.com/jgraph/drawio/commit/c287bef9101d024b1fd59d55ecd530f25000f9d8

Restart Required: Yes

Instructions:

1. Update draw.io to version 18.1.2 or later. 2. For web deployments: update the application files. 3. For desktop applications: download and install the latest version. 4. For embedded integrations: update the draw.io library to the patched version.

🔧 Temporary Workarounds

Access Restriction

all

Restrict network access to draw.io instances to authorized users only

Sensitive Data Isolation

all

Ensure sensitive diagrams and data are not stored in vulnerable draw.io instances

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access draw.io instances
  • Monitor for unusual access patterns or data exfiltration attempts

🔍 How to Verify

Check if Vulnerable:

Check draw.io version. If version is below 18.1.2, the system is vulnerable.

Check Version:

In draw.io web app: Help → About. Desktop: Help → About draw.io. Command line varies by deployment.

Verify Fix Applied:

Confirm draw.io version is 18.1.2 or higher and test that sensitive information is properly protected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to draw.io endpoints
  • Requests attempting to access protected resources

Network Indicators:

  • Unexpected data transfers from draw.io servers
  • Unauthorized access attempts

SIEM Query:

source="drawio" AND (status=200 OR status=403) AND (uri CONTAINS "/api/" OR uri CONTAINS "/data/")

🔗 References

📤 Share & Export