XML DOM Processing Instruction Vulnerability in xmldom Module
CVE-2026-41675

8.7HIGH

Key Information:

Vendor

Xmldom

Status
Vendor
CVE Published:
7 May 2026

What is CVE-2026-41675?

The xmldom module, which implements the W3C standard for XML DOM, contains a vulnerability that permits the serialization of attacker-controlled processing instruction data. This flaw can allow an attacker to manipulate the XML output by prematurely terminating processing instructions, potentially leading to the injection of arbitrary XML nodes. Affected users should upgrade to versions @xmldom/xmldom 0.9.10, 0.8.13 or xmldom 0.6.0 and above to mitigate this risk.

Affected Version(s)

xmldom xmldom <= 0.6.0 <= xmldom 0.6.0

xmldom @xmldom/xmldom >= 0.9.0, < 0.9.10 < @xmldom/xmldom 0.9.0, 0.9.10

xmldom @xmldom/xmldom < 0.8.13 < @xmldom/xmldom 0.8.13

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.