diff --git a/advisories/github-reviewed/2026/03/GHSA-v2wj-7wpq-c8vv/GHSA-v2wj-7wpq-c8vv.json b/advisories/github-reviewed/2026/03/GHSA-v2wj-7wpq-c8vv/GHSA-v2wj-7wpq-c8vv.json index ed6eb46fdcdf7..5f687c87a4351 100644 --- a/advisories/github-reviewed/2026/03/GHSA-v2wj-7wpq-c8vv/GHSA-v2wj-7wpq-c8vv.json +++ b/advisories/github-reviewed/2026/03/GHSA-v2wj-7wpq-c8vv/GHSA-v2wj-7wpq-c8vv.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-v2wj-7wpq-c8vv", - "modified": "2026-03-27T21:59:55Z", + "modified": "2026-03-27T21:59:57Z", "published": "2026-03-03T18:31:33Z", "aliases": [ "CVE-2026-0540" @@ -9,10 +9,6 @@ "summary": "DOMPurify contains a Cross-site Scripting vulnerability", "details": "DOMPurify 3.1.3 through 3.3.1 and 2.5.3 through 2.5.8, fixed in 2.5.9 and 3.3.2, contain a cross-site scripting vulnerability that allows attackers to bypass attribute sanitization by exploiting five missing rawtext elements (noscript, xmp, noembed, noframes, iframe) in the `SAFE_FOR_XML` regex. Attackers can include payloads like `` in attribute values to execute JavaScript when sanitized output is placed inside these unprotected rawtext contexts.", "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" - }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" @@ -92,10 +88,6 @@ { "type": "WEB", "url": "https://www.vulncheck.com/advisories/dompurify-xss-via-missing-rawtext-elements-in-safe-for-xml" - }, - { - "type": "WEB", - "url": "https://www.vulncheck.com/advisories/dompurify-xss-via-missing-rawtext-elements-in-safeforxml" } ], "database_specific": {