CVE-2025-15599: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cure53 DOMPurify
DOMPurify 3.1.3 through 3.2.6 and 2.5.3 through 2.5.8 contain a cross-site scripting vulnerability that allows attackers to bypass attribute sanitization by exploiting missing textarea rawtext element validation in the SAFE_FOR_XML regex. Attackers can include closing rawtext tags like </textarea> in attribute values to break out of rawtext contexts and execute JavaScript when sanitized output is placed inside rawtext elements. The 3.x branch was fixed in 3.2.7; the 2.x branch was never patched.
AI Analysis
Technical Summary
DOMPurify is a widely used client-side JavaScript library designed to sanitize HTML and prevent cross-site scripting (XSS) attacks by neutralizing malicious input during web page generation. CVE-2025-15599 affects versions 3.1.3 through 3.2.6 and 2.5.3 through 2.5.8 of DOMPurify. The vulnerability stems from an incomplete sanitization process related to the handling of rawtext elements, specifically the textarea element, within the SAFE_FOR_XML regular expression used to validate input. This missing validation allows attackers to inject closing rawtext tags such as </textarea> inside attribute values, effectively breaking out of the rawtext context. When the sanitized output is placed inside rawtext elements, this can lead to execution of arbitrary JavaScript code, resulting in a cross-site scripting attack. The 3.x branch of DOMPurify was patched in version 3.2.7 to address this issue, but the 2.x branch remains vulnerable as it has not been patched. The vulnerability has a CVSS 4.0 base score of 5.1, reflecting a medium severity level. It requires no privileges but does require user interaction, such as a victim visiting a crafted web page. No known exploits have been reported in the wild to date. This vulnerability is significant because DOMPurify is commonly embedded in web applications and frameworks to sanitize user-generated content, and a successful exploit could allow attackers to execute malicious scripts in the context of the victim's browser, potentially leading to session hijacking, data theft, or other malicious activities.
Potential Impact
The impact of CVE-2025-15599 is primarily on the confidentiality and integrity of web applications that rely on vulnerable versions of DOMPurify for sanitizing user input. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of the victim's browser, which can lead to theft of sensitive information such as cookies, session tokens, or other credentials. It can also enable further attacks like phishing, defacement, or spreading malware. Since DOMPurify is widely used in many web applications and frameworks globally, the scope of affected systems is broad. The vulnerability does not directly affect server availability but can undermine user trust and lead to reputational damage. Because exploitation requires user interaction, the attack vector typically involves social engineering or tricking users into visiting maliciously crafted web pages. Organizations that embed vulnerable DOMPurify versions in their web applications risk exposing their users to these attacks, especially in environments where user-generated content is displayed without additional sanitization layers.
Mitigation Recommendations
To mitigate CVE-2025-15599, organizations should immediately upgrade to DOMPurify version 3.2.7 or later for the 3.x branch, which contains the patch for this vulnerability. For users of the 2.x branch, it is strongly recommended to migrate to the 3.x branch since the 2.x branch remains unpatched and vulnerable. Additionally, developers should review their use of DOMPurify to ensure that sanitized output is not placed inside rawtext elements without proper context validation. Implementing Content Security Policy (CSP) headers can provide an additional layer of defense by restricting the execution of unauthorized scripts. Web application developers should also conduct thorough input validation and output encoding as defense-in-depth measures. Regular security testing, including automated scanning for XSS vulnerabilities and manual code reviews focusing on sanitization logic, is advised. Finally, educating developers about the correct usage of sanitization libraries and staying current with security patches is critical to preventing exploitation.
Affected Countries
United States, Germany, United Kingdom, France, India, Japan, Australia, Canada, Netherlands, South Korea, Brazil, Italy
CVE-2025-15599: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cure53 DOMPurify
Description
DOMPurify 3.1.3 through 3.2.6 and 2.5.3 through 2.5.8 contain a cross-site scripting vulnerability that allows attackers to bypass attribute sanitization by exploiting missing textarea rawtext element validation in the SAFE_FOR_XML regex. Attackers can include closing rawtext tags like </textarea> in attribute values to break out of rawtext contexts and execute JavaScript when sanitized output is placed inside rawtext elements. The 3.x branch was fixed in 3.2.7; the 2.x branch was never patched.
AI-Powered Analysis
Technical Analysis
DOMPurify is a widely used client-side JavaScript library designed to sanitize HTML and prevent cross-site scripting (XSS) attacks by neutralizing malicious input during web page generation. CVE-2025-15599 affects versions 3.1.3 through 3.2.6 and 2.5.3 through 2.5.8 of DOMPurify. The vulnerability stems from an incomplete sanitization process related to the handling of rawtext elements, specifically the textarea element, within the SAFE_FOR_XML regular expression used to validate input. This missing validation allows attackers to inject closing rawtext tags such as </textarea> inside attribute values, effectively breaking out of the rawtext context. When the sanitized output is placed inside rawtext elements, this can lead to execution of arbitrary JavaScript code, resulting in a cross-site scripting attack. The 3.x branch of DOMPurify was patched in version 3.2.7 to address this issue, but the 2.x branch remains vulnerable as it has not been patched. The vulnerability has a CVSS 4.0 base score of 5.1, reflecting a medium severity level. It requires no privileges but does require user interaction, such as a victim visiting a crafted web page. No known exploits have been reported in the wild to date. This vulnerability is significant because DOMPurify is commonly embedded in web applications and frameworks to sanitize user-generated content, and a successful exploit could allow attackers to execute malicious scripts in the context of the victim's browser, potentially leading to session hijacking, data theft, or other malicious activities.
Potential Impact
The impact of CVE-2025-15599 is primarily on the confidentiality and integrity of web applications that rely on vulnerable versions of DOMPurify for sanitizing user input. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of the victim's browser, which can lead to theft of sensitive information such as cookies, session tokens, or other credentials. It can also enable further attacks like phishing, defacement, or spreading malware. Since DOMPurify is widely used in many web applications and frameworks globally, the scope of affected systems is broad. The vulnerability does not directly affect server availability but can undermine user trust and lead to reputational damage. Because exploitation requires user interaction, the attack vector typically involves social engineering or tricking users into visiting maliciously crafted web pages. Organizations that embed vulnerable DOMPurify versions in their web applications risk exposing their users to these attacks, especially in environments where user-generated content is displayed without additional sanitization layers.
Mitigation Recommendations
To mitigate CVE-2025-15599, organizations should immediately upgrade to DOMPurify version 3.2.7 or later for the 3.x branch, which contains the patch for this vulnerability. For users of the 2.x branch, it is strongly recommended to migrate to the 3.x branch since the 2.x branch remains unpatched and vulnerable. Additionally, developers should review their use of DOMPurify to ensure that sanitized output is not placed inside rawtext elements without proper context validation. Implementing Content Security Policy (CSP) headers can provide an additional layer of defense by restricting the execution of unauthorized scripts. Web application developers should also conduct thorough input validation and output encoding as defense-in-depth measures. Regular security testing, including automated scanning for XSS vulnerabilities and manual code reviews focusing on sanitization logic, is advised. Finally, educating developers about the correct usage of sanitization libraries and staying current with security patches is critical to preventing exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-03-03T16:11:56.845Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a71bdad1a09e29cb63690d
Added to database: 3/3/2026, 5:35:22 PM
Last enriched: 3/3/2026, 5:47:59 PM
Last updated: 3/4/2026, 7:52:57 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28775: CWE-1188: Insecure Default Initialization of Resource in International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver
CriticalCVE-2026-28774: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface
CriticalCVE-2026-28773: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface
CriticalCVE-2026-28772: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface
MediumCVE-2026-28771: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver Web Management Interface
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.