Home

Description

DOMPurify 3.1.3 through 3.2.6 and 2.5.3 through 2.5.8 contain a cross-site scripting vulnerability that allows attackers to bypass attribute sanitization by exploiting missing textarea rawtext element validation in the SAFE_FOR_XML regex. Attackers can include closing rawtext tags like </textarea> in attribute values to break out of rawtext contexts and execute JavaScript when sanitized output is placed inside rawtext elements. The 3.x branch was fixed in 3.2.7; the 2.x branch was never patched.

PUBLISHED Reserved 2026-03-03 | Published 2026-03-03 | Updated 2026-03-03 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

3.1.3 (semver)
affected

3.2.7 (semver)
unaffected

2.5.3 (semver)
affected

Credits

Scott Moore - VulnCheck finder

References

github.com/cure53/DOMPurify (DOMPurify GitHub Repository) product

github.com/...ommit/c861f5a83fb8d90800f1680f855fee551161ac2b patch

www.vulncheck.com/...textarea-rawtext-bypass-in-safe-for-xml (VulnCheck Advisory: DOMPurify XSS via Textarea Rawtext Bypass in SAFE_FOR_XML) third-party-advisory

cve.org (CVE-2025-15599)

nvd.nist.gov (CVE-2025-15599)

Download JSON