๐Ÿ” CVE Alert

CVE-2026-41675

UNKNOWN 0.0

xmldom: XML node injection through unvalidated processing instruction serialization

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In @xmldom/xmldom prior to versions 0.9.10 and 0.8.13 and xmldom version 0.6.0 and prior, the package allows attacker-controlled processing instruction data to be serialized into XML without validating or neutralizing the PI-closing sequence ?>. As a result, an attacker can terminate the processing instruction early and inject arbitrary XML nodes into the serialized output. This issue has been patched in versions @xmldom/xmldom versions 0.9.10 and 0.8.13.

CWE CWE-91
Vendor xmldom
Product xmldom
Published May 7, 2026
Stay Ahead of the Next One

Get instant alerts for xmldom xmldom

Be the first to know when new unknown vulnerabilities affecting xmldom xmldom are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

xmldom / xmldom
xmldom <= 0.6.0 @xmldom/xmldom >= 0.9.0, < 0.9.10 @xmldom/xmldom < 0.8.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/xmldom/xmldom/security/advisories/GHSA-x6wf-f3px-wcqx github.com: https://github.com/xmldom/xmldom/commit/7207a4b0e0bcc228868075ed991665ef9f73b1c2 github.com: https://github.com/xmldom/xmldom/releases/tag/0.8.13 github.com: https://github.com/xmldom/xmldom/releases/tag/0.9.10