CVE-2026-41672

Published: Mag 07, 2026 Last Modified: Mag 07, 2026
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 8,7
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A

Description

AI Translation Available

xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In @xmldom/xmldom prior to versions 0.9.10 and 0.8.13 and xmldom version 0.6.0 and prior, the package allows attacker-controlled comment content to be serialized into XML without validating or neutralizing comment-breaking sequences. As a result, an attacker can terminate the comment early and inject arbitrary XML nodes into the serialized output. This issue has been patched in versions @xmldom/xmldom versions 0.9.10 and 0.8.13.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0006
Percentile
0,2th
Updated

EPSS Score Trend (Last 2 Days)

91

XML Injection (aka Blind XPath Injection)

Draft
Common Consequences
Security Scopes Affected:
Confidentiality Integrity Availability
Potential Impacts:
Execute Unauthorized Code Or Commands Read Application Data Modify Application Data
Applicable Platforms
All platforms may be affected
View CWE Details
https://github.com/xmldom/xmldom/security/advisories/GHSA-j759-j44w-7fr8
https://github.com/xmldom/xmldom/commit/b397540889086da868c30c366ad5c220d1a750c7
https://github.com/xmldom/xmldom/commit/fda7cc313de30243fea35cada64e0bb12099c2a1
https://github.com/xmldom/xmldom/pull/987
https://github.com/xmldom/xmldom/releases/tag/0.8.13
https://github.com/xmldom/xmldom/releases/tag/0.9.10
https://github.com/xmldom/xmldom/security/advisories/GHSA-j759-j44w-7fr8