Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27119: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sveltejs svelte

0
Medium
VulnerabilityCVE-2026-27119cvecve-2026-27119cwe-79
Published: Fri Feb 20 2026 (02/20/2026, 22:25:42 UTC)
Source: CVE Database V5
Vendor/Project: sveltejs
Product: svelte

Description

CVE-2026-27119 is a medium severity cross-site scripting (XSS) vulnerability in the Svelte web framework versions 5. 39. 3 through 5. 51. 4. It arises from improper escaping of content within <option> elements during server-side rendering (SSR), allowing potential HTML injection. Client-side rendering is not affected. Exploitation requires high privileges and authentication, and the vulnerability has a CVSS score of 5. 1. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 02/20/2026, 23:03:51 UTC

Technical Analysis

CVE-2026-27119 identifies a cross-site scripting vulnerability in the Svelte JavaScript framework, specifically affecting server-side rendering output of <option> elements. Between versions 5.39.3 and 5.51.4, the framework fails to properly escape content within these elements during SSR, leading to improper neutralization of input (CWE-79). This flaw allows an attacker with sufficient privileges to inject arbitrary HTML into the SSR output, potentially leading to HTML injection attacks. Since client-side rendering is unaffected, the vulnerability is limited to SSR contexts. The vulnerability requires high attack complexity, privileges, and authentication, and does not require user interaction. The CVSS 4.0 vector indicates network attack vector, high complexity, privileged attacker, and low impact on confidentiality, integrity, and availability. The vulnerability was published on February 20, 2026, and fixed in version 5.51.5 of Svelte. No known exploits have been reported, but the flaw could be leveraged in environments where SSR is used to generate dynamic option elements with untrusted input.

Potential Impact

The primary impact of this vulnerability is the potential for HTML injection via SSR output, which could lead to cross-site scripting attacks if exploited. This can compromise the integrity of web pages rendered by the server, potentially allowing attackers to execute malicious scripts in the context of the affected web application. While the impact on confidentiality and availability is low, the integrity and trustworthiness of the web content can be undermined. Organizations relying on Svelte SSR for dynamic content generation, especially those rendering user-supplied data within <option> elements, are at risk. Exploitation requires authenticated, privileged access, limiting the threat to insider attackers or compromised accounts. However, successful exploitation could facilitate further attacks such as session hijacking or defacement. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

1. Upgrade all Svelte instances to version 5.51.5 or later, where this vulnerability is patched. 2. Review server-side rendering code to ensure that all user-supplied input is properly sanitized and escaped before rendering, especially within <option> elements. 3. Implement strict Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks. 4. Limit privileges and access controls to reduce the risk of attackers gaining the necessary authentication and privileges to exploit this vulnerability. 5. Conduct code audits and penetration testing focused on SSR output to detect any residual injection issues. 6. Monitor application logs and user activity for suspicious behavior indicative of attempted exploitation. 7. Educate developers on secure coding practices related to SSR and input handling in Svelte.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-17T18:42:27.043Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6998e47bbe58cf853bd9f745

Added to database: 2/20/2026, 10:47:23 PM

Last enriched: 2/20/2026, 11:03:51 PM

Last updated: 2/21/2026, 3:48:41 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats