CVE-2026-34601

HIGH

xmldom: XML injection via unsafe CDATA serialization allows attacker-controlled markup insertion

Title source: cna

Description

xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In xmldom versions 0.6.0 and prior and @xmldom/xmldom prior to versions 0.8.12 and 0.9.9, xmldom/xmldom allows attacker-controlled strings containing the CDATA terminator ]]> to be inserted into a CDATASection node. During serialization, XMLSerializer emitted the CDATA content verbatim without rejecting or safely splitting the terminator. As a result, data intended to remain text-only became active XML markup in the serialized output, enabling XML structure injection and downstream business-logic manipulation. This issue has been patched in xmldom version 0.6.0 and @xmldom/xmldom versions 0.8.12 and 0.9.9.

Scores

CVSS v3 7.5
EPSS 0.0005
EPSS Percentile 16.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-91
Status published
Products (5)
npm/xmldom 0npm
xmldom/xmldom 0 - 0.8.12npm
xmldom/xmldom xmldom <= 0.6.0
xmldom/xmldom @xmldom/xmldom < 0.8.12
xmldom/xmldom @xmldom/xmldom >= 0.9.0, < 0.9.9
Published Apr 02, 2026
Tracked Since Apr 03, 2026