CVE-2026-41672
xmldom: XML node injection through unvalidated comment serialization
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In @xmldom/xmldom prior to versions 0.9.10 and 0.8.13 and xmldom version 0.6.0 and prior, the package allows attacker-controlled comment content to be serialized into XML without validating or neutralizing comment-breaking sequences. As a result, an attacker can terminate the comment early and inject arbitrary XML nodes into the serialized output. This issue has been patched in versions @xmldom/xmldom versions 0.9.10 and 0.8.13.
| CWE | CWE-91 |
| Vendor | xmldom |
| Product | xmldom |
| Published | May 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for xmldom xmldom
Be the first to know when new unknown vulnerabilities affecting xmldom xmldom are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
xmldom / xmldom
xmldom <= 0.6.0 @xmldom/xmldom >= 0.9.0, < 0.9.10 @xmldom/xmldom < 0.8.13
References
github.com: https://github.com/xmldom/xmldom/security/advisories/GHSA-j759-j44w-7fr8 github.com: https://github.com/xmldom/xmldom/pull/987 github.com: https://github.com/xmldom/xmldom/commit/b397540889086da868c30c366ad5c220d1a750c7 github.com: https://github.com/xmldom/xmldom/commit/fda7cc313de30243fea35cada64e0bb12099c2a1 github.com: https://github.com/xmldom/xmldom/releases/tag/0.8.13 github.com: https://github.com/xmldom/xmldom/releases/tag/0.9.10