CVE-2026-33943

HIGH

Happy DOM ECMAScriptModuleCompiler: unsanitized export names are interpolated as executable code

Title source: cna
STIX 2.1

Description

Happy DOM is a JavaScript implementation of a web browser without its graphical user interface. In versions 15.10.0 through 20.8.7, a code injection vulnerability in `ECMAScriptModuleCompiler` allows an attacker to achieve Remote Code Execution (RCE) by injecting arbitrary JavaScript expressions inside `export { }` declarations in ES module scripts processed by happy-dom. The compiler directly interpolates unsanitized content into generated code as an executable expression, and the quote filter does not strip backticks, allowing template literal-based payloads to bypass sanitization. Version 20.8.8 fixes the issue.

Scores

CVSS v3 8.8
EPSS 0.0006
EPSS Percentile 19.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-94
Status published
Products (3)
capricorn86/happy-dom >= 15.10.0, < 20.8.8
capricorn86/happy_dom 15.10.0 - 20.8.8
npm/happy-dom 15.10.0 - 20.8.8npm
Published Mar 27, 2026
Tracked Since Mar 29, 2026