CVE-2026-33979

HIGH

Express XSS Sanitizer: allowedTags/allowedAttributes bypass leads to permissive sanitization (XSS risk)

Title source: cna
STIX 2.1

Description

Express XSS Sanitizer is Express 4.x and 5.x middleware which sanitizes user input data (in req.body, req.query, req.headers and req.params) to prevent Cross Site Scripting (XSS) attack. A vulnerability has been identified in versions prior to 2.0.2 where restrictive sanitization configurations are silently ignored. In version 2.0.2, the validation logic has been updated to respect explicitly provided empty configurations. Now, if allowedTags or allowedAttributes are provided (even if empty), they are passed directly to sanitize-html without being overridden.

Scores

CVSS v3 8.2
EPSS 0.0001
EPSS Percentile 2.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-183 CWE-79
Status published
Products (3)
AhmedAdelFahim/express-xss-sanitizer < 2.0.2
express_xss_sanitizer_project/express_xss_sanitizer < 2.0.2
npm/express-xss-sanitizer 0 - 2.0.2npm
Published Mar 27, 2026
Tracked Since Mar 29, 2026