Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-f6ww-3ggp-fr8h | xmldom has XML injection through unvalidated DocumentType serialization |
Thu, 14 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 07 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xmldom
Xmldom xmldom |
|
| Vendors & Products |
Xmldom
Xmldom xmldom |
Thu, 07 May 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In @xmldom/xmldom prior to versions 0.9.10 and 0.8.13 and xmldom version 0.6.0 and prior, the package serializes DocumentType node fields (internalSubset, publicId, systemId) verbatim without any escaping or validation. When these fields are set programmatically to attacker-controlled strings, XMLSerializer.serializeToString can produce output where the DOCTYPE declaration is terminated early and arbitrary markup appears outside it. This issue has been patched in versions @xmldom/xmldom versions 0.9.10 and 0.8.13. | |
| Title | xmldom: XML injection through unvalidated DocumentType serialization | |
| Weaknesses | CWE-91 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-07T12:35:39.361Z
Reserved: 2026-04-22T03:53:24.405Z
Link: CVE-2026-41674
Updated: 2026-05-07T12:35:12.270Z
Status : Deferred
Published: 2026-05-07T04:16:33.433
Modified: 2026-05-07T15:02:46.607
Link: CVE-2026-41674
OpenCVE Enrichment
Updated: 2026-05-07T07:30:24Z
Github GHSA