Intel

AIKIDO-2025-10497

@babylonjs/gui is vulnerable to Cross-site Scripting (XSS)

Cross-site Scripting (XSS) Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

40

Medium Risk

This Affects:

JS@babylonjs/gui
4.1.0 - 8.17.1
Fixed in 8.17.2

TL;DR

Affected versions of this package are vulnerable to SVG parsing XSS, where image loader insecurely processes SVG content, failing to sanitize non-SVG elements like <link> or <img> during parsing. It allows attackers to craft malicious SVG images containing embedded scripts or external resource tags that execute when loaded via Babylon.js GUI.Image component. Exploitation occurs when a vulnerable application (without proper Content Security Policies) renders user-supplied SVG files, enabling cross-site scripting (XSS) attacks that hijack user sessions, steal data, or perform malicious actions within the application context.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

@babylonjs/gui is vulnerable to Cross-site Scripting (XSS) in versions 4.1.0 - 8.17.1.

How to fix this

Upgrade the @babylonjs/gui library to the patch version.