CVE-2026-41674 PUBLISHED

xmldom: XML injection through unvalidated DocumentType serialization

Assigner: GitHub_M
Reserved: 22.04.2026 Published: 07.05.2026 Updated: 07.05.2026

xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. In @xmldom/xmldom prior to versions 0.9.10 and 0.8.13 and xmldom version 0.6.0 and prior, the package serializes DocumentType node fields (internalSubset, publicId, systemId) verbatim without any escaping or validation. When these fields are set programmatically to attacker-controlled strings, XMLSerializer.serializeToString can produce output where the DOCTYPE declaration is terminated early and arbitrary markup appears outside it. This issue has been patched in versions @xmldom/xmldom versions 0.9.10 and 0.8.13.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor xmldom
Product xmldom
Versions
  • Version xmldom <= 0.6.0 is affected
  • Version @xmldom/xmldom >= 0.9.0, < 0.9.10 is affected
  • Version @xmldom/xmldom < 0.8.13 is affected

References

Problem Types

  • CWE-91: XML Injection (aka Blind XPath Injection) CWE