CVE-2026-41672
Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
07/05/2026
Last modified:
07/05/2026
Description
xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In @xmldom/xmldom prior to versions 0.9.10 and 0.8.13 and xmldom version 0.6.0 and prior, the package allows attacker-controlled comment content to be serialized into XML without validating or neutralizing comment-breaking sequences. As a result, an attacker can terminate the comment early and inject arbitrary XML nodes into the serialized output. This issue has been patched in versions @xmldom/xmldom versions 0.9.10 and 0.8.13.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
References to Advisories, Solutions, and Tools
- https://github.com/xmldom/xmldom/commit/b397540889086da868c30c366ad5c220d1a750c7
- https://github.com/xmldom/xmldom/commit/fda7cc313de30243fea35cada64e0bb12099c2a1
- https://github.com/xmldom/xmldom/pull/987
- https://github.com/xmldom/xmldom/releases/tag/0.8.13
- https://github.com/xmldom/xmldom/releases/tag/0.9.10
- https://github.com/xmldom/xmldom/security/advisories/GHSA-j759-j44w-7fr8
- https://github.com/xmldom/xmldom/security/advisories/GHSA-j759-j44w-7fr8



