Home

Description

xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In @xmldom/xmldom prior to versions 0.9.10 and 0.8.13 and xmldom version 0.6.0 and prior, the package allows attacker-controlled processing instruction data to be serialized into XML without validating or neutralizing the PI-closing sequence ?>. As a result, an attacker can terminate the processing instruction early and inject arbitrary XML nodes into the serialized output. This issue has been patched in versions @xmldom/xmldom versions 0.9.10 and 0.8.13.

PUBLISHED Reserved 2026-04-22 | Published 2026-05-07 | Updated 2026-05-07 | Assigner GitHub_M




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-91: XML Injection (aka Blind XPath Injection)

Product status

xmldom <= 0.6.0
affected

@xmldom/xmldom >= 0.9.0, < 0.9.10
affected

@xmldom/xmldom < 0.8.13
affected

References

github.com/...xmldom/security/advisories/GHSA-x6wf-f3px-wcqx exploit

github.com/...xmldom/security/advisories/GHSA-x6wf-f3px-wcqx

github.com/...ommit/7207a4b0e0bcc228868075ed991665ef9f73b1c2

github.com/xmldom/xmldom/releases/tag/0.8.13

github.com/xmldom/xmldom/releases/tag/0.9.10

cve.org (CVE-2026-41675)

nvd.nist.gov (CVE-2026-41675)

Download JSON