Home

Description

xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In xmldom versions 0.6.0 and prior and @xmldom/xmldom prior to versions 0.8.12 and 0.9.9, xmldom/xmldom allows attacker-controlled strings containing the CDATA terminator ]]> to be inserted into a CDATASection node. During serialization, XMLSerializer emitted the CDATA content verbatim without rejecting or safely splitting the terminator. As a result, data intended to remain text-only became active XML markup in the serialized output, enabling XML structure injection and downstream business-logic manipulation. This issue has been patched in xmldom version 0.6.0 and @xmldom/xmldom versions 0.8.12 and 0.9.9.

PUBLISHED Reserved 2026-03-30 | Published 2026-04-02 | Updated 2026-04-03 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Problem types

CWE-91: XML Injection (aka Blind XPath Injection)

Product status

xmldom <= 0.6.0
affected

@xmldom/xmldom < 0.8.12
affected

@xmldom/xmldom >= 0.9.0, < 0.9.9
affected

References

github.com/...xmldom/security/advisories/GHSA-wh4c-j3r5-mjhp exploit

github.com/...xmldom/security/advisories/GHSA-wh4c-j3r5-mjhp

github.com/...ommit/2b852e836ab86dbbd6cbaf0537f584dd0b5ac184

github.com/xmldom/xmldom/releases/tag/0.8.12

github.com/xmldom/xmldom/releases/tag/0.9.9

cve.org (CVE-2026-34601)

nvd.nist.gov (CVE-2026-34601)

Download JSON