Description
DOMPurify before 3.2.4 has an incorrect template literal regular expression when SAFE_FOR_TEMPLATES is set to true, sometimes leading to mutation cross-site scripting (mXSS).
Recommendation
Update the dompurify
package to the latest compatible version. Followings are version details:
- Affected version(s): < 3.2.4
- Patched version(s): 3.2.4
References
Related Issues
- mpregular vulnerable to prototype pollution - CVE-2025-57323
- lite-server vulnerable to Denial of Service - CVE-2022-25940
- Manifest Uses a One-Way Hash without a Salt - CVE-2025-27408
- Regular Expression Denial of Service (ReDoS) - Vulnerability
- Tags:
- npm
- dompurify
Anything's wrong? Let us know Last updated on June 30, 2025