CVE-2026-0540
Severity CVSS v4.0:
MEDIUM
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
03/03/2026
Last modified:
25/03/2026
Description
DOMPurify 3.1.3 through 3.3.1 and 2.5.3 through 2.5.8, fixed in commit 2726c74, contain a cross-site scripting vulnerability that allows attackers to bypass attribute sanitization by exploiting five missing rawtext elements (noscript, xmp, noembed, noframes, iframe) in the SAFE_FOR_XML regex. Attackers can include payloads like in attribute values to execute JavaScript when sanitized output is placed inside these unprotected rawtext contexts.
Impact
Base Score 4.0
5.30
Severity 4.0
MEDIUM
Base Score 3.x
6.10
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cure53:dompurify:*:*:*:*:*:*:*:* | 2.5.3 (including) | 2.5.8 (including) |
| cpe:2.3:a:cure53:dompurify:*:*:*:*:*:*:*:* | 3.1.3 (including) | 3.3.1 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://fluidattacks.com/advisories/daft
- https://github.com/cure53/DOMPurify
- https://github.com/cure53/DOMPurify/commit/302b51de22535cc90235472c52e3401bedd46f80
- https://github.com/cure53/DOMPurify/releases/tag/3.3.2
- https://www.vulncheck.com/advisories/dompurify-xss-via-missing-rawtext-elements-in-safe-for-xml



