CVE-2026-41674
xmldom: XML injection through unvalidated DocumentType serialization
xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In @xmldom/xmldom prior to versions 0.9.10 and 0.8.13 and xmldom version 0.6.0 and prior, the package serializes DocumentType node fields (internalSubset, publicId, systemId) verbatim without any escaping or validation. When these fields are set programmatically to attacker-controlled strings, XMLSerializer.serializeToString can produce output where the DOCTYPE declaration is terminated early and arbitrary markup appears outside it. This issue has been patched in versions @xmldom/xmldom versions 0.9.10 and 0.8.13.
| CWE | CWE-91 |
| Vendor | xmldom |
| Product | xmldom |
| Published | May 7, 2026 |
Get instant alerts for xmldom xmldom
Be the first to know when new unknown vulnerabilities affecting xmldom xmldom are published โ delivered to Slack, Telegram or Discord.