Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27121: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sveltejs svelte

0
Medium
VulnerabilityCVE-2026-27121cvecve-2026-27121cwe-79
Published: Fri Feb 20 2026 (02/20/2026, 22:27:36 UTC)
Source: CVE Database V5
Vendor/Project: sveltejs
Product: svelte

Description

svelte performance oriented web framework. Versions of svelte prior to 5.51.5 are vulnerable to cross-site scripting (XSS) during server-side rendering. When using spread syntax to render attributes from untrusted data, event handler properties are included in the rendered HTML output. If an application spreads user-controlled or external data as element attributes, an attacker can inject malicious event handlers that execute in victims' browsers. This vulnerability is fixed in 5.51.5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 13:24:11 UTC

Technical Analysis

CVE-2026-27121 is a cross-site scripting (XSS) vulnerability identified in the Svelte JavaScript framework, specifically affecting versions prior to 5.51.5. Svelte is a performance-oriented web framework that compiles components into highly optimized JavaScript code. The vulnerability occurs during server-side rendering when the framework processes spread syntax to render HTML element attributes from untrusted or user-controlled data. In these cases, event handler properties (such as onclick, onmouseover, etc.) are inadvertently included in the rendered HTML output. This improper neutralization of input (classified under CWE-79) allows an attacker to inject malicious event handlers into the HTML, which execute in the context of the victim’s browser when the page is loaded. Exploitation requires that the application spreads user-controlled or external data as element attributes without proper sanitization or filtering. The vulnerability is rated medium severity with a CVSS 4.0 score of 5.1, reflecting network attack vector, high attack complexity, partial privileges required, no user interaction, and limited impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild as of the publication date. The issue is resolved in Svelte version 5.51.5, which properly excludes event handler properties from spread attributes during server-side rendering. This vulnerability highlights the risks of directly spreading untrusted data into HTML attributes without strict validation or sanitization in modern web frameworks.

Potential Impact

The primary impact of CVE-2026-27121 is the potential for cross-site scripting attacks against web applications built with vulnerable versions of Svelte. Successful exploitation allows attackers to execute arbitrary JavaScript in the browsers of users visiting affected applications, potentially leading to session hijacking, credential theft, defacement, or distribution of malware. Since the vulnerability occurs during server-side rendering, it can affect any user accessing the rendered pages without requiring user interaction. The medium CVSS score reflects that exploitation requires specific coding patterns (spread syntax with untrusted data) and some privileges, limiting widespread automated exploitation. However, organizations using Svelte in customer-facing or internal web applications risk compromise of user data and trust if they do not update. The vulnerability could be leveraged in targeted attacks against high-value web applications or services relying on Svelte for UI rendering. The absence of known exploits suggests limited current active threat but does not preclude future exploitation once the vulnerability becomes widely known. Overall, the impact is significant for organizations that have not patched and that use untrusted data in attribute spreading, especially those with sensitive user data or critical web services.

Mitigation Recommendations

To mitigate CVE-2026-27121, organizations should immediately upgrade all Svelte instances to version 5.51.5 or later, where the vulnerability is fixed. Beyond patching, developers must audit their codebases for usage of spread syntax that renders attributes from untrusted or external data sources. Avoid spreading user-controlled data directly into element attributes, especially event handlers. Implement strict input validation and sanitization to ensure that only safe attribute names and values are allowed. Consider using allowlists for attributes and explicitly exclude event handler properties when rendering dynamic attributes. Employ Content Security Policy (CSP) headers to restrict script execution and reduce the impact of potential XSS. Conduct thorough security testing, including static analysis and dynamic scanning, focusing on injection vectors in server-side rendering logic. Educate development teams on secure coding practices related to attribute spreading and server-side rendering in modern frameworks. Monitor security advisories for further updates or related vulnerabilities in Svelte or dependent libraries.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-17T18:42:27.043Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6998e47bbe58cf853bd9f748

Added to database: 2/20/2026, 10:47:23 PM

Last enriched: 2/28/2026, 1:24:11 PM

Last updated: 4/7/2026, 8:33:15 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses