Cyber Posture

CVE-2026-34601

High

Published: 02 April 2026

Published
02 April 2026
Modified
16 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0006 18.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-34601 is a high-severity aka Blind XPath Injection (CWE-91) vulnerability. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely patching of the vulnerable xmldom library versions to remediate the CDATA terminator mishandling flaw.

prevent

Validates attacker-controlled input strings to the XML parser to block insertion of CDATA terminators enabling XML structure injection.

prevent

Filters serialized XML output to prevent unhandled CDATA terminators from transforming text into active XML markup.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a remote, unauthenticated XML structure injection in a widely-used JavaScript library, directly enabling exploitation of public-facing applications that process or serialize XML using the affected xmldom module.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In xmldom versions 0.6.0 and prior and @xmldom/xmldom prior to versions 0.8.12 and 0.9.9, xmldom/xmldom allows attacker-controlled strings containing the CDATA terminator ]]> to…

more

be inserted into a CDATASection node. During serialization, XMLSerializer emitted the CDATA content verbatim without rejecting or safely splitting the terminator. As a result, data intended to remain text-only became active XML markup in the serialized output, enabling XML structure injection and downstream business-logic manipulation. This issue has been patched in xmldom version 0.6.0 and @xmldom/xmldom versions 0.8.12 and 0.9.9.

Deeper analysisAI

CVE-2026-34601 affects the xmldom JavaScript module, a pure JavaScript implementation of W3C standard-based XML DOM Level 2 Core DOMParser and XMLSerializer. The vulnerability exists in xmldom versions 0.6.0 and prior, as well as @xmldom/xmldom versions prior to 0.8.12 and 0.9.9. It stems from the ability to insert attacker-controlled strings containing the CDATA terminator "]]>" into a CDATASection node, which the XMLSerializer then emits verbatim during serialization without rejection or safe splitting. This transforms intended text-only data into active XML markup, enabling XML structure injection (CWE-91).

Remote attackers require no privileges or user interaction to exploit this over the network with low complexity, as indicated by the CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). By supplying a malicious string with the CDATA terminator, an attacker can inject arbitrary XML structures into the serialized output, potentially manipulating downstream business logic in applications that parse or process the resulting XML.

The GitHub security advisory (GHSA-wh4c-j3r5-mjhp) and related patch commits detail mitigation through upgrades: xmldom to version 0.6.0, @xmldom/xmldom to 0.8.12 or 0.9.9. Specific fixes are available in commit 2b852e836ab86dbbd6cbaf0537f584dd0b5ac184 and the corresponding release tags.

Details

CWE(s)

CVEs Like This One

CVE-2026-32870Shared CWE-91
CVE-2026-28770Shared CWE-91
CVE-2025-25589Shared CWE-91
CVE-2024-47113Shared CWE-91
CVE-2022-50902Shared CWE-91
CVE-2025-66034Shared CWE-91

References