CVE-2026-34601
HIGHxmldom: XML injection via unsafe CDATA serialization allows attacker-controlled markup insertion
Title source: cnaDescription
xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In xmldom versions 0.6.0 and prior and @xmldom/xmldom prior to versions 0.8.12 and 0.9.9, xmldom/xmldom allows attacker-controlled strings containing the CDATA terminator ]]> to be inserted into a CDATASection node. During serialization, XMLSerializer emitted the CDATA content verbatim without rejecting or safely splitting the terminator. As a result, data intended to remain text-only became active XML markup in the serialized output, enabling XML structure injection and downstream business-logic manipulation. This issue has been patched in xmldom version 0.6.0 and @xmldom/xmldom versions 0.8.12 and 0.9.9.
Scores
CVSS v3
7.5
EPSS
0.0005
EPSS Percentile
16.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-91
Status
published
Products (5)
npm/xmldom
0npm
xmldom/xmldom
0 - 0.8.12npm
xmldom/xmldom
xmldom <= 0.6.0
xmldom/xmldom
@xmldom/xmldom < 0.8.12
xmldom/xmldom
@xmldom/xmldom >= 0.9.0, < 0.9.9
Published
Apr 02, 2026
Tracked Since
Apr 03, 2026