DOMPurify contains a Cross-site Scripting vulnerability
Moderate severity
GitHub Reviewed
Published
Mar 3, 2026
to the GitHub Advisory Database
•
Updated Mar 4, 2026
Package
Affected versions
>= 3.1.3, < 3.2.7
>= 2.5.3, <= 2.5.8
Patched versions
3.2.7
Description
Published by the National Vulnerability Database
Mar 3, 2026
Published to the GitHub Advisory Database
Mar 3, 2026
Reviewed
Mar 4, 2026
Last updated
Mar 4, 2026
DOMPurify 3.1.3 through 3.2.6 and 2.5.3 through 2.5.8 contain a cross-site scripting vulnerability that allows attackers to bypass attribute sanitization by exploiting missing textarea rawtext element validation in the SAFE_FOR_XML regex. Attackers can include closing rawtext tags like </textarea> in attribute values to break out of rawtext contexts and execute JavaScript when sanitized output is placed inside rawtext elements. The 3.x branch was fixed in 3.2.7; the 2.x branch was never patched.
References