Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47875: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cure53 DOMPurify

0
Critical
VulnerabilityCVE-2024-47875cvecve-2024-47875cwe-79
Published: Fri Oct 11 2024 (10/11/2024, 14:59:27 UTC)
Source: CVE Database V5
Vendor/Project: cure53
Product: DOMPurify

Description

DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMpurify was vulnerable to nesting-based mXSS. This vulnerability is fixed in 2.5.0 and 3.1.3.

AI-Powered Analysis

AILast updated: 11/03/2025, 19:58:21 UTC

Technical Analysis

DOMPurify is a popular JavaScript library designed to sanitize HTML, MathML, and SVG inputs to prevent cross-site scripting (XSS) attacks by neutralizing malicious code embedded in user-generated content. CVE-2024-47875 identifies a critical vulnerability classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), specifically a nesting-based mutation XSS (mXSS) flaw. This vulnerability arises when DOMPurify fails to correctly sanitize nested elements or complex input structures, allowing attackers to inject malicious scripts that execute in the victim's browser context. The flaw affects all DOMPurify versions prior to 2.5.0 and 3.1.3, with the issue fixed in these releases. The CVSS v3.1 score of 10.0 reflects the vulnerability's severity: it is remotely exploitable over the network without any privileges or user interaction, and it impacts confidentiality, integrity, and availability (C, I, A) of affected systems. Exploitation could lead to session hijacking, data theft, defacement, or further attacks on internal networks. Although no active exploits have been reported, the widespread adoption of DOMPurify in web applications globally makes this a significant risk. The vulnerability's complexity lies in the subtlety of nested input sanitization failures, requiring developers to update to patched versions promptly.

Potential Impact

For European organizations, the impact of CVE-2024-47875 can be severe due to the extensive use of DOMPurify in web applications, including content management systems, e-commerce platforms, and internal portals. Successful exploitation could lead to unauthorized disclosure of sensitive data, including personal data protected under GDPR, resulting in regulatory penalties and reputational damage. Integrity breaches could allow attackers to manipulate displayed content or inject fraudulent information, undermining trust and potentially causing financial losses. Availability impacts might include denial-of-service conditions triggered by malicious scripts. Sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to the sensitivity of their data and services. The vulnerability's remote and unauthenticated exploitability increases the attack surface, especially for public-facing applications. Additionally, the cross-site scripting nature facilitates phishing and social engineering attacks, amplifying the threat. Organizations failing to patch promptly risk exposure to advanced persistent threats and automated exploit tools once they emerge.

Mitigation Recommendations

European organizations should immediately audit their web applications and libraries to identify usage of DOMPurify versions prior to 2.5.0 or 3.1.3. The primary mitigation is to upgrade DOMPurify to version 2.5.0 or later, or 3.1.3 or later, where the vulnerability is fixed. Developers should review custom sanitization logic to ensure no fallback to vulnerable versions occurs. Implement Content Security Policy (CSP) headers with strict script-src directives to limit script execution sources and reduce impact of potential XSS. Employ runtime application self-protection (RASP) tools that can detect and block XSS payloads dynamically. Conduct thorough penetration testing focusing on nested input scenarios to validate remediation. Educate development teams about secure coding practices related to input sanitization and nested content handling. Monitor web application logs and security alerts for suspicious activity indicative of attempted exploitation. Finally, maintain an incident response plan tailored to XSS incidents to enable rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2024-10-04T16:00:09.630Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690908517fff0e30cee23587

Added to database: 11/3/2025, 7:53:53 PM

Last enriched: 11/3/2025, 7:58:21 PM

Last updated: 11/4/2025, 3:16:29 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats