First published: Fri Oct 11 2024(Updated: )
DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMpurify was vulnerable to nesting-based mXSS. This vulnerability is fixed in 2.5.0 and 3.1.3.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/dompurify | >=3.0.0<3.1.3 | 3.1.3 |
npm/dompurify | <2.5.0 | 2.5.0 |
IBM Data Virtualization on Cloud Pak for Data | <=3.0 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.2 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.1 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.0 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.8 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-47875 is classified as high due to its potential for cross-site scripting attacks.
To fix CVE-2024-47875, update DOMPurify to version 2.5.0 or 3.1.3 or later.
CVE-2024-47875 is a nesting-based mXSS vulnerability affecting the DOMPurify library.
CVE-2024-47875 affects DOMPurify versions between 3.0.0 and 3.1.2, as well as versions below 2.5.0.
Yes, CVE-2024-47875 is considered a critical vulnerability due to the risk of executing malicious scripts.