dompurify@0.6.4 vulnerabilities

DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. It's written in JavaScript and works in all modern browsers (Safari, Opera (15+), Internet Explorer (10+), Firefox and Chrome - as well as almost anything else usin

Direct Vulnerabilities

Known vulnerabilities in the dompurify package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Open Redirect

dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG.

Affected versions of this package are vulnerable to Open Redirect in the hooks-target-blank-demo.html demo, via reverse tabnabbing. An attacker can redirect users to a malicious website by exploiting the lack of rel="noopener noreferrer" attribute in links.

How to fix Open Redirect?

Upgrade dompurify to version 1.0.11 or higher.

<1.0.11
  • M
Cross-site Scripting (XSS)

dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). This is due to a bypass of a previous XSS vulnerability.

How to fix Cross-site Scripting (XSS)?

Upgrade dompurify to version 2.2.3 or higher.

<2.2.3
  • M
Cross-site Scripting (XSS)

dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when converting from SVG namespace.

How to fix Cross-site Scripting (XSS)?

Upgrade dompurify to version 2.2.2 or higher.

<2.2.2
  • M
Cross-site Scripting (XSS)

dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements.

How to fix Cross-site Scripting (XSS)?

Upgrade dompurify to version 2.0.17 or higher.

<2.0.17
  • C
Cross-site Scripting (XSS)

dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via innerHTML mutation XSS (mXSS) for an SVG element or a MATH element, as demonstrated by Chrome and Safari.

How to fix Cross-site Scripting (XSS)?

Upgrade dompurify to version 2.0.3 or higher.

<2.0.3
  • M
Cross-site Scripting (XSS)

DOMPurify is a DOM-only XSS sanitizer for HTML, MathML and SVG.

Affected versions of this package are vulnerable to a Cross-site Scripting (XSS) bug in Safari (>= versions 10.1). Specifically, when DOMPurify attempts to parse a string like:

<svg onload=alert(document.domain)>

it will result in XSS.

How to fix Cross-site Scripting (XSS)?

Upgrade dompurify to version 0.8.6 or higher.

<0.8.6