CVE-2026-0540
MediumVulnerability Description
DOMPurify 3.1.3 through 3.3.1 and 2.5.3 through 2.5.8, fixed in commit 2726c74, contain a cross-site scripting vulnerability that allows attackers to bypass attribute sanitization by exploiting five missing rawtext elements (noscript, xmp, noembed, noframes, iframe) in the SAFE_FOR_XML regex. Attackers can include payloads like </noscript><img src=x onerror=alert(1)> in attribute values to execute JavaScript when sanitized output is placed inside these unprotected rawtext contexts.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Known Affected Software
20 configuration(s) from 1 vendor(s)
cpe:2.3:a:cure53:dompurify:2.5.6:*:*:*:*:*:*:*
cpe:2.3:a:cure53:dompurify:3.2.7:*:*:*:*:*:*:*
cpe:2.3:a:cure53:dompurify:2.5.5:*:*:*:*:*:*:*
cpe:2.3:a:cure53:dompurify:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:cure53:dompurify:3.1.7:*:*:*:*:*:*:*
cpe:2.3:a:cure53:dompurify:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:cure53:dompurify:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:cure53:dompurify:3.1.6:*:*:*:*:*:*:*
cpe:2.3:a:cure53:dompurify:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:cure53:dompurify:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:cure53:dompurify:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:cure53:dompurify:2.5.8:*:*:*:*:*:*:*
cpe:2.3:a:cure53:dompurify:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:cure53:dompurify:2.5.7:*:*:*:*:*:*:*
cpe:2.3:a:cure53:dompurify:3.2.5:*:*:*:*:*:*:*
cpe:2.3:a:cure53:dompurify:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:cure53:dompurify:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:cure53:dompurify:3.2.6:*:*:*:*:*:*:*
cpe:2.3:a:cure53:dompurify:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:cure53:dompurify:3.2.0:*:*:*:*:*:*:*
CPUAPR2026
Oracle Critical Patch Update Advisory - April 2026
References & Resources
-
https://fluidattacks.com/advisories/dafthelp@fluidattacks.com
-
https://github.com/cure53/DOMPurifyhelp@fluidattacks.com Product
-
https://github.com/cure53/DOMPurify/commit/302b51de22535cc90235472c52e3401bedd46f80help@fluidattacks.com
-
https://github.com/cure53/DOMPurify/releases/tag/3.3.2help@fluidattacks.com
-
https://www.vulncheck.com/advisories/dompurify-xss-via-missing-rawtext-elements-in-safe-for-xmlhelp@fluidattacks.com Third Party Advisory
Severity Details
Weakness Type (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- Description
- The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
- Exploit Likelihood
- High
- Typical Severity
- Medium
- OWASP Top 10
- A03:2021-Injection
- Abstraction Level
- Base
Key Information
- Published Date
- March 03, 2026
