Xmldom vulnerabilities

6 known vulnerabilities affecting xmldom/xmldom.

Total CVEs
6
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH3MEDIUM2

Vulnerabilities

Page 1 of 1
CVE-2026-34601HIGHCVSS 7.5vxmldom <= 0.6.0v@xmldom/xmldom < 0.8.12+1 more2026-04-02
CVE-2026-34601 [HIGH] CWE-91 CVE-2026-34601: xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In xmldom versions 0.6.0 and prior and @xmldom/xmldom prior to versions 0.8.12 and 0.9.9, xmldom/xmldom allows attacker-controlled strings containing the CDATA terminator ]]> to be inserted into a CDATASection node. During serialization, XMLSer
ghsanvdosv
CVE-2022-39353HIGHCVSS 8.1≥ 0, ≤ 0.6.0≥ 0, < 0.7.7+2 more2022-11-01
CVE-2022-39353 [HIGH] CWE-1288 xmldom allows multiple root nodes in a DOM xmldom allows multiple root nodes in a DOM ### Impact xmldom parses XML that is not well-formed because it contains multiple top level elements, and adds all root nodes to the `childNodes` collection of the `Document`, without reporting any error or throwing. This breaks the assumption that there is only a single root node in the tree, which led to https://nvd.nist.gov/vuln/detail/CVE-2022-39299 and is a potential issue f
ghsaosv
CVE-2022-39299HIGHCVSS 8.1≤ 0.6.0fixed in 0.7.7+2 more2022-10-12
CVE-2022-39299 [HIGH] CWE-347 CVE-2022-39299: Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated atta
nvd
CVE-2022-37616CRITICAL≥ 0.8.0, < 0.8.3≥ 0, ≤ 0.6.0+2 more2022-10-11
CVE-2022-37616 [CRITICAL] CWE-1321 Withdrawn: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in @xmldom/xmldom and xmldom Withdrawn: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in @xmldom/xmldom and xmldom ## Withdrawn This advisory has been withdrawn because the maintainers of `@xmldom/xmldom` and multiple third parties disputed the validity of the issue. Attempts to create or replicate a proof of concept
ghsaosv
CVE-2021-32796MEDIUMCVSS 5.3fixed in 0.7.02021-07-27
CVE-2021-32796 [MEDIUM] CWE-116 CVE-2021-32796: xmldom is an open source pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XML xmldom is an open source pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications. T
ghsanvdosv
CVE-2021-21366MEDIUMCVSS 4.3fixed in 0.5.02021-03-12
CVE-2021-21366 [MEDIUM] CWE-115 CVE-2021-21366: xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer mo xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.4.0 and older do not correctly preserve system identifiers, FPIs or namespaces when repeatedly parsing and serializing maliciously crafted documents. This may lead to unexpected syntactic changes during XML processing in some d
ghsanvdosv