{"api_version":"1","generated_at":"2026-04-23T18:57:30+00:00","cve":"CVE-2021-32796","urls":{"html":"https://cve.report/CVE-2021-32796","api":"https://cve.report/api/cve/CVE-2021-32796.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-32796","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-32796"},"summary":{"title":"CVE-2021-32796","description":"xmldom is an open source pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications. This issue has been resolved in version 0.7.0. As a workaround downstream applications can validate the input and reject the maliciously crafted documents.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2021-07-27 22:15:00","updated_at":"2022-04-25 17:25:00"},"problem_types":["CWE-116","CWE-91"],"metrics":[],"references":[{"url":"https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b","name":"https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b","refsource":"MISC","tags":[],"title":"Merge pull request from GHSA-5fg8-2547-mr8q · xmldom/xmldom@7b4b743 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q","name":"https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q","refsource":"CONFIRM","tags":[],"title":"Misinterpretation of malicious XML input · Advisory · xmldom/xmldom · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/","name":"https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/","refsource":"MISC","tags":[],"title":"Coordinated disclosure of XML round-trip vulnerabilities in Go library","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-32796","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32796","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"32796","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xmldom_project","cpe5":"xmldom","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"node.js","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-32796","qid":"981558","title":"Nodejs (npm) Security Update for xmldom (GHSA-5fg8-2547-mr8q)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2021-32796","STATE":"PUBLIC","TITLE":"Misinterpretation of malicious XML input in xmldom"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"xmldom","version":{"version_data":[{"version_value":"< 0.7.0"}]}}]},"vendor_name":"xmldom"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"xmldom is an open source pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications. This issue has been resolved in version 0.7.0. As a workaround downstream applications can validate the input and reject the maliciously crafted documents."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-116: Improper Encoding or Escaping of Output"}]}]},"references":{"reference_data":[{"name":"https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/","refsource":"MISC","url":"https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/"},{"name":"https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q","refsource":"CONFIRM","url":"https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q"},{"name":"https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b","refsource":"MISC","url":"https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b"}]},"source":{"advisory":"GHSA-5fg8-2547-mr8q","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-07-27 22:15:00","lastModifiedDate":"2022-04-25 17:25:00","problem_types":["CWE-116","CWE-91"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:xmldom_project:xmldom:*:*:*:*:*:node.js:*:*","versionEndExcluding":"0.7.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"32796","Ordinal":"208184","Title":"CVE-2021-32796","CVE":"CVE-2021-32796","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"32796","Ordinal":"1","NoteData":"xmldom is an open source pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications. This issue has been resolved in version 0.7.0. As a workaround downstream applications can validate the input and reject the maliciously crafted documents.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"32796","Ordinal":"2","NoteData":"2021-07-27","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"32796","Ordinal":"3","NoteData":"2021-07-27","Type":"Other","Title":"Modified"}]}}}