๐Ÿ” CVE Alert

CVE-2026-41672

UNKNOWN 0.0

xmldom: XML node injection through unvalidated comment serialization

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In @xmldom/xmldom prior to versions 0.9.10 and 0.8.13 and xmldom version 0.6.0 and prior, the package allows attacker-controlled comment content to be serialized into XML without validating or neutralizing comment-breaking sequences. As a result, an attacker can terminate the comment early and inject arbitrary XML nodes into the serialized output. This issue has been patched in versions @xmldom/xmldom versions 0.9.10 and 0.8.13.

CWE CWE-91
Vendor xmldom
Product xmldom
Published May 7, 2026
Stay Ahead of the Next One

Get instant alerts for xmldom xmldom

Be the first to know when new unknown vulnerabilities affecting xmldom xmldom are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

xmldom / xmldom
xmldom <= 0.6.0 @xmldom/xmldom >= 0.9.0, < 0.9.10 @xmldom/xmldom < 0.8.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/xmldom/xmldom/security/advisories/GHSA-j759-j44w-7fr8 github.com: https://github.com/xmldom/xmldom/pull/987 github.com: https://github.com/xmldom/xmldom/commit/b397540889086da868c30c366ad5c220d1a750c7 github.com: https://github.com/xmldom/xmldom/commit/fda7cc313de30243fea35cada64e0bb12099c2a1 github.com: https://github.com/xmldom/xmldom/releases/tag/0.8.13 github.com: https://github.com/xmldom/xmldom/releases/tag/0.9.10