Debian Package Tracker
Register | Log in
Subscribe

node-dompurify

DOM-only, super-fast, uber-tolerant XSS sanitizer

Choose email to subscribe with

general
  • source: node-dompurify (main)
  • version: 3.3.3+dfsg-2
  • maintainer: Debian Javascript Maintainers (archive) (DMD)
  • uploaders: Pirate Praveen [DMD]
  • arch: all
  • std-ver: 4.7.4
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 2.4.1+dfsg+~2.4.0-2+deb12u1
  • old-sec: 2.4.1+dfsg+~2.4.0-2
  • stable: 3.1.7+dfsg+~3.0.5-2
  • testing: 3.3.3+dfsg-2
  • unstable: 3.3.3+dfsg-2
versioned links
  • 2.4.1+dfsg+~2.4.0-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.4.1+dfsg+~2.4.0-2+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.1.7+dfsg+~3.0.5-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.3.3+dfsg-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • node-dompurify
action needed
5 security issues in trixie high

There are 5 open security issues in trixie.

5 important issues:
  • CVE-2026-0540: DOMPurify 3.1.3 through 3.3.1 and 2.5.3 through 2.5.8, fixed in commit 2726c74, contain a cross-site scripting vulnerability that allows attackers to bypass attribute sanitization by exploiting five missing rawtext elements (noscript, xmp, noembed, noframes, iframe) in the SAFE_FOR_XML regex. Attackers can include payloads like </noscript><img src=x onerror=alert(1)> in attribute values to execute JavaScript when sanitized output is placed inside these unprotected rawtext contexts.
  • CVE-2025-15599: DOMPurify 3.1.3 through 3.2.6 and 2.5.3 through 2.5.8 contain a cross-site scripting vulnerability that allows attackers to bypass attribute sanitization by exploiting missing textarea rawtext element validation in the SAFE_FOR_XML regex. Attackers can include closing rawtext tags like </textarea> in attribute values to break out of rawtext contexts and execute JavaScript when sanitized output is placed inside rawtext elements. The 3.x branch was fixed in 3.2.7; the 2.x branch was never patched.
  • CVE-2026-41238: DOMPurify is a DOM-only cross-site scripting sanitizer for HTML, MathML, and SVG. Versions 3.0.1 through 3.3.3 are vulnerable to a prototype pollution-based XSS bypass. When an application uses `DOMPurify.sanitize()` with the default configuration (no `CUSTOM_ELEMENT_HANDLING` option), a prior prototype pollution gadget can inject permissive `tagNameCheck` and `attributeNameCheck` regex values into `Object.prototype`, causing DOMPurify to allow arbitrary custom elements with arbitrary attributes — including event handlers — through sanitization. Version 3.4.0 fixes the issue.
  • CVE-2026-41239: DOMPurify is a DOM-only cross-site scripting sanitizer for HTML, MathML, and SVG. Starting in version 1.0.10 and prior to version 3.4.0, `SAFE_FOR_TEMPLATES` strips `{{...}}` expressions from untrusted HTML. This works in string mode but not with `RETURN_DOM` or `RETURN_DOM_FRAGMENT`, allowing XSS via template-evaluating frameworks like Vue 2. Version 3.4.0 patches the issue.
  • CVE-2026-41240: DOMPurify is a DOM-only cross-site scripting sanitizer for HTML, MathML, and SVG. Versions prior to 3.4.0 have an inconsistency between FORBID_TAGS and FORBID_ATTR handling when function-based ADD_TAGS is used. Commit c361baa added an early exit for FORBID_ATTR at line 1214. The same fix was not applied to FORBID_TAGS. At line 1118-1123, when EXTRA_ELEMENT_HANDLING.tagCheck returns true, the short-circuit evaluation skips the FORBID_TAGS check entirely. This allows forbidden elements to survive sanitization with their attributes intact. Version 3.4.0 patches the issue.
Created: 2026-03-04 Last update: 2026-04-25 15:16
3 security issues in sid high

There are 3 open security issues in sid.

3 important issues:
  • CVE-2026-41238: DOMPurify is a DOM-only cross-site scripting sanitizer for HTML, MathML, and SVG. Versions 3.0.1 through 3.3.3 are vulnerable to a prototype pollution-based XSS bypass. When an application uses `DOMPurify.sanitize()` with the default configuration (no `CUSTOM_ELEMENT_HANDLING` option), a prior prototype pollution gadget can inject permissive `tagNameCheck` and `attributeNameCheck` regex values into `Object.prototype`, causing DOMPurify to allow arbitrary custom elements with arbitrary attributes — including event handlers — through sanitization. Version 3.4.0 fixes the issue.
  • CVE-2026-41239: DOMPurify is a DOM-only cross-site scripting sanitizer for HTML, MathML, and SVG. Starting in version 1.0.10 and prior to version 3.4.0, `SAFE_FOR_TEMPLATES` strips `{{...}}` expressions from untrusted HTML. This works in string mode but not with `RETURN_DOM` or `RETURN_DOM_FRAGMENT`, allowing XSS via template-evaluating frameworks like Vue 2. Version 3.4.0 patches the issue.
  • CVE-2026-41240: DOMPurify is a DOM-only cross-site scripting sanitizer for HTML, MathML, and SVG. Versions prior to 3.4.0 have an inconsistency between FORBID_TAGS and FORBID_ATTR handling when function-based ADD_TAGS is used. Commit c361baa added an early exit for FORBID_ATTR at line 1214. The same fix was not applied to FORBID_TAGS. At line 1118-1123, when EXTRA_ELEMENT_HANDLING.tagCheck returns true, the short-circuit evaluation skips the FORBID_TAGS check entirely. This allows forbidden elements to survive sanitization with their attributes intact. Version 3.4.0 patches the issue.
Created: 2026-04-23 Last update: 2026-04-25 15:16
3 security issues in forky high

There are 3 open security issues in forky.

3 important issues:
  • CVE-2026-41238: DOMPurify is a DOM-only cross-site scripting sanitizer for HTML, MathML, and SVG. Versions 3.0.1 through 3.3.3 are vulnerable to a prototype pollution-based XSS bypass. When an application uses `DOMPurify.sanitize()` with the default configuration (no `CUSTOM_ELEMENT_HANDLING` option), a prior prototype pollution gadget can inject permissive `tagNameCheck` and `attributeNameCheck` regex values into `Object.prototype`, causing DOMPurify to allow arbitrary custom elements with arbitrary attributes — including event handlers — through sanitization. Version 3.4.0 fixes the issue.
  • CVE-2026-41239: DOMPurify is a DOM-only cross-site scripting sanitizer for HTML, MathML, and SVG. Starting in version 1.0.10 and prior to version 3.4.0, `SAFE_FOR_TEMPLATES` strips `{{...}}` expressions from untrusted HTML. This works in string mode but not with `RETURN_DOM` or `RETURN_DOM_FRAGMENT`, allowing XSS via template-evaluating frameworks like Vue 2. Version 3.4.0 patches the issue.
  • CVE-2026-41240: DOMPurify is a DOM-only cross-site scripting sanitizer for HTML, MathML, and SVG. Versions prior to 3.4.0 have an inconsistency between FORBID_TAGS and FORBID_ATTR handling when function-based ADD_TAGS is used. Commit c361baa added an early exit for FORBID_ATTR at line 1214. The same fix was not applied to FORBID_TAGS. At line 1118-1123, when EXTRA_ELEMENT_HANDLING.tagCheck returns true, the short-circuit evaluation skips the FORBID_TAGS check entirely. This allows forbidden elements to survive sanitization with their attributes intact. Version 3.4.0 patches the issue.
Created: 2026-04-23 Last update: 2026-04-25 15:16
6 security issues in bookworm high

There are 6 open security issues in bookworm.

5 important issues:
  • CVE-2026-0540: DOMPurify 3.1.3 through 3.3.1 and 2.5.3 through 2.5.8, fixed in commit 2726c74, contain a cross-site scripting vulnerability that allows attackers to bypass attribute sanitization by exploiting five missing rawtext elements (noscript, xmp, noembed, noframes, iframe) in the SAFE_FOR_XML regex. Attackers can include payloads like </noscript><img src=x onerror=alert(1)> in attribute values to execute JavaScript when sanitized output is placed inside these unprotected rawtext contexts.
  • CVE-2025-15599: DOMPurify 3.1.3 through 3.2.6 and 2.5.3 through 2.5.8 contain a cross-site scripting vulnerability that allows attackers to bypass attribute sanitization by exploiting missing textarea rawtext element validation in the SAFE_FOR_XML regex. Attackers can include closing rawtext tags like </textarea> in attribute values to break out of rawtext contexts and execute JavaScript when sanitized output is placed inside rawtext elements. The 3.x branch was fixed in 3.2.7; the 2.x branch was never patched.
  • CVE-2026-41238: DOMPurify is a DOM-only cross-site scripting sanitizer for HTML, MathML, and SVG. Versions 3.0.1 through 3.3.3 are vulnerable to a prototype pollution-based XSS bypass. When an application uses `DOMPurify.sanitize()` with the default configuration (no `CUSTOM_ELEMENT_HANDLING` option), a prior prototype pollution gadget can inject permissive `tagNameCheck` and `attributeNameCheck` regex values into `Object.prototype`, causing DOMPurify to allow arbitrary custom elements with arbitrary attributes — including event handlers — through sanitization. Version 3.4.0 fixes the issue.
  • CVE-2026-41239: DOMPurify is a DOM-only cross-site scripting sanitizer for HTML, MathML, and SVG. Starting in version 1.0.10 and prior to version 3.4.0, `SAFE_FOR_TEMPLATES` strips `{{...}}` expressions from untrusted HTML. This works in string mode but not with `RETURN_DOM` or `RETURN_DOM_FRAGMENT`, allowing XSS via template-evaluating frameworks like Vue 2. Version 3.4.0 patches the issue.
  • CVE-2026-41240: DOMPurify is a DOM-only cross-site scripting sanitizer for HTML, MathML, and SVG. Versions prior to 3.4.0 have an inconsistency between FORBID_TAGS and FORBID_ATTR handling when function-based ADD_TAGS is used. Commit c361baa added an early exit for FORBID_ATTR at line 1214. The same fix was not applied to FORBID_TAGS. At line 1118-1123, when EXTRA_ELEMENT_HANDLING.tagCheck returns true, the short-circuit evaluation skips the FORBID_TAGS check entirely. This allows forbidden elements to survive sanitization with their attributes intact. Version 3.4.0 patches the issue.
1 issue left for the package maintainer to handle:
  • CVE-2025-26791: (needs triaging) DOMPurify before 3.2.4 has an incorrect template literal regular expression, sometimes leading to mutation cross-site scripting (mXSS).

You can find information about how to handle this issue in the security team's documentation.

Created: 2025-02-14 Last update: 2026-04-25 15:16
A new upstream version is available: 3.4.1 high
A new upstream version 3.4.1 is available, you should consider packaging it.
Created: 2026-04-15 Last update: 2026-04-25 10:00
lintian reports 3 warnings normal
Lintian reports 3 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-03-25 Last update: 2026-03-25 03:30
news
[rss feed]
  • [2026-04-25] Accepted node-dompurify 3.4.1+dfsg-1 (source) into unstable (Xavier Guimard)
  • [2026-04-16] node-dompurify 3.3.3+dfsg-2 MIGRATED to testing (Debian testing watch)
  • [2026-04-11] Accepted node-dompurify 3.3.3+dfsg-2 (source) into unstable (Xavier Guimard)
  • [2026-03-28] node-dompurify 3.3.3+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-23] Accepted node-dompurify 3.3.3+dfsg-1 (source) into unstable (Xavier Guimard)
  • [2026-03-12] node-dompurify 3.3.2+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-06] Accepted node-dompurify 3.3.2+dfsg-1 (source) into unstable (Xavier Guimard)
  • [2025-05-01] node-dompurify 3.1.7+dfsg+~3.0.5-2 MIGRATED to testing (Debian testing watch)
  • [2025-04-21] Accepted node-dompurify 3.1.7+dfsg+~3.0.5-2 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2025-04-21] Accepted node-dompurify 3.2.5+dfsg-1 (source) into experimental (Yadd) (signed by: Xavier Guimard)
  • [2024-11-03] Accepted node-dompurify 2.4.1+dfsg+~2.4.0-2+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Xavier Guimard)
  • [2024-10-18] node-dompurify 3.1.7+dfsg+~3.0.5-1 MIGRATED to testing (Debian testing watch)
  • [2024-10-15] Accepted node-dompurify 2.4.1+dfsg+~2.4.0-2 (source) into proposed-updates (Debian FTP Masters) (signed by: Xavier Guimard)
  • [2024-10-13] Accepted node-dompurify 2.4.1+dfsg+~2.4.0-2 (source) into stable-security (Debian FTP Masters) (signed by: Xavier Guimard)
  • [2024-10-12] Accepted node-dompurify 3.1.7+dfsg+~3.0.5-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2024-09-22] node-dompurify 3.1.6+dfsg+~3.0.5-1 MIGRATED to testing (Debian testing watch)
  • [2024-09-17] Accepted node-dompurify 3.1.6+dfsg+~3.0.5-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2024-03-12] node-dompurify 3.0.9+dfsg+~3.0.5-1 MIGRATED to testing (Debian testing watch)
  • [2024-03-06] Accepted node-dompurify 3.0.9+dfsg+~3.0.5-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-12-01] node-dompurify 2.4.1+dfsg+~2.4.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-11-25] Accepted node-dompurify 2.4.1+dfsg+~2.4.0-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-11-21] Accepted node-dompurify 2.4.0+dfsg+~2.3.4-3 (source) into unstable (Jelmer Vernooij) (signed by: Jelmer Vernooij)
  • [2022-10-08] node-dompurify 2.4.0+dfsg+~2.3.4-2 MIGRATED to testing (Debian testing watch)
  • [2022-10-03] Accepted node-dompurify 2.4.0+dfsg+~2.3.4-2 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-09-04] node-dompurify 2.4.0+dfsg+~2.3.4-1 MIGRATED to testing (Debian testing watch)
  • [2022-08-25] Accepted node-dompurify 2.4.0+dfsg+~2.3.4-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-08-02] node-dompurify 2.3.10+dfsg+~2.3.3-1 MIGRATED to testing (Debian testing watch)
  • [2022-07-27] Accepted node-dompurify 2.3.10+dfsg+~2.3.3-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-07-21] node-dompurify 2.3.9+dfsg+~2.3.3-1 MIGRATED to testing (Debian testing watch)
  • [2022-07-16] Accepted node-dompurify 2.3.9+dfsg+~2.3.3-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • 1
  • 2
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 3)
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.3.3+dfsg-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing