CVE-2026-41675
xmldom: XML node injection through unvalidated processing instruction serialization
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In @xmldom/xmldom prior to versions 0.9.10 and 0.8.13 and xmldom version 0.6.0 and prior, the package allows attacker-controlled processing instruction data to be serialized into XML without validating or neutralizing the PI-closing sequence ?>. As a result, an attacker can terminate the processing instruction early and inject arbitrary XML nodes into the serialized output. This issue has been patched in versions @xmldom/xmldom versions 0.9.10 and 0.8.13.
| CWE | CWE-91 |
| Vendor | xmldom |
| Product | xmldom |
| Published | May 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for xmldom xmldom
Be the first to know when new unknown vulnerabilities affecting xmldom xmldom are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
xmldom / xmldom
xmldom <= 0.6.0 @xmldom/xmldom >= 0.9.0, < 0.9.10 @xmldom/xmldom < 0.8.13
References
github.com: https://github.com/xmldom/xmldom/security/advisories/GHSA-x6wf-f3px-wcqx github.com: https://github.com/xmldom/xmldom/commit/7207a4b0e0bcc228868075ed991665ef9f73b1c2 github.com: https://github.com/xmldom/xmldom/releases/tag/0.8.13 github.com: https://github.com/xmldom/xmldom/releases/tag/0.9.10