Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27119: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sveltejs svelte

0
Medium
VulnerabilityCVE-2026-27119cvecve-2026-27119cwe-79
Published: Fri Feb 20 2026 (02/20/2026, 22:25:42 UTC)
Source: CVE Database V5
Vendor/Project: sveltejs
Product: svelte

Description

svelte performance oriented web framework. From 5.39.3, <=5.51.4, in certain circumstances, the server-side rendering output of an <option> element does not properly escape its content, potentially allowing HTML injection in the SSR output. Client-side rendering is not affected. This vulnerability is fixed in 5.51.5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 13:21:51 UTC

Technical Analysis

CVE-2026-27119 is a cross-site scripting (XSS) vulnerability classified under CWE-79, discovered in the Svelte JavaScript framework, specifically affecting server-side rendering (SSR) output of <option> HTML elements. The flaw exists in Svelte versions from 5.39.3 up to and including 5.51.4, where the SSR output does not properly escape the content of <option> elements under certain conditions. This improper neutralization of input during web page generation allows an attacker with sufficient privileges to inject arbitrary HTML into the SSR output, potentially leading to XSS attacks. Notably, client-side rendering is unaffected, limiting the attack vector to SSR implementations. The vulnerability requires high attack complexity and partial authentication, with no user interaction needed. The CVSS v4.0 score is 5.1, reflecting a medium severity level. The vulnerability was publicly disclosed on February 20, 2026, and fixed in version 5.51.5 of Svelte. No known exploits have been reported in the wild to date. This vulnerability can be leveraged by attackers to manipulate rendered HTML, potentially leading to session hijacking, defacement, or other injection-based attacks depending on the application context. The issue arises from insufficient escaping of input data in the SSR pipeline, specifically in the generation of <option> elements within select dropdowns, which are common in web forms and interfaces.

Potential Impact

The primary impact of CVE-2026-27119 is the potential for attackers to inject malicious HTML into server-side rendered pages, which can lead to cross-site scripting attacks. This can compromise the confidentiality and integrity of user data by enabling session hijacking, credential theft, or unauthorized actions performed on behalf of users. Since the vulnerability affects SSR output, applications that rely heavily on server-side rendering for dynamic content generation are at risk. The attack complexity is high and requires partial authentication, which limits the scope to insider threats or compromised accounts with elevated privileges. However, once exploited, the attacker can manipulate the HTML content delivered to end-users without requiring their interaction, increasing the stealth and effectiveness of the attack. The availability impact is minimal as the vulnerability does not directly affect system uptime or functionality. Organizations using affected Svelte versions in production environments may face reputational damage and regulatory consequences if user data is compromised. The lack of known exploits in the wild suggests limited current exploitation but does not preclude future attacks, especially as the vulnerability becomes more widely known.

Mitigation Recommendations

To mitigate CVE-2026-27119, organizations should immediately upgrade all Svelte framework instances to version 5.51.5 or later, where the vulnerability is patched. For environments where immediate upgrading is not feasible, implement strict input validation and sanitization on all data used in server-side rendering, especially for content rendered within <option> elements. Employ Content Security Policy (CSP) headers to restrict the execution of injected scripts and reduce the impact of potential XSS attacks. Conduct thorough code reviews and security testing focused on SSR output escaping mechanisms. Additionally, restrict access to administrative or privileged accounts to reduce the risk of exploitation requiring partial authentication. Monitor application logs and web traffic for unusual patterns indicative of injection attempts. Educate developers on secure coding practices related to SSR and HTML escaping. Finally, maintain an up-to-date inventory of all applications using Svelte SSR to ensure timely patching and vulnerability management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-17T18:42:27.043Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6998e47bbe58cf853bd9f745

Added to database: 2/20/2026, 10:47:23 PM

Last enriched: 2/28/2026, 1:21:51 PM

Last updated: 4/7/2026, 8:31:32 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses