
Cloud Vulnerability DB
A community-led vulnerabilities database
DOMPurify versions prior to 2.2.2 were found to be vulnerable to Cross-site Scripting (XSS) when converting from SVG namespace. The vulnerability was discovered and publicly disclosed on November 3, 2020, and was assigned the identifier GHSA-pgjv-jrg2-gq3v. DOMPurify is a DOM-only XSS sanitizer for HTML, MathML and SVG, and this vulnerability affected all versions below 2.2.2 (GitHub Advisory, Snyk Report).
The vulnerability is classified as a Cross-site Scripting (XSS) issue with moderate severity. The issue specifically manifests when converting content from the SVG namespace, allowing potential mutation XSS attacks. The vulnerability was discovered through both public and private reports, leading to the identification of multiple mXSS variations (DOMPurify Release).
This vulnerability could allow attackers to perform cross-site scripting attacks, potentially leading to cookie theft, session hijacking, exposure of sensitive information, access to privileged services and functionality, or delivery of malware. The attack requires user interaction and can affect web servers, application servers, and web application environments (Snyk Report).
The vulnerability was patched in DOMPurify version 2.2.2. Users are advised to upgrade to this version or higher to mitigate the risk. The fix addresses both the publicly disclosed mXSS bypass and a privately reported variation. Additionally, the update included adding dialog to the permitted elements list (DOMPurify Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."