Security Alert: DOMPurify 3.3.2 Patches Critical mXSS Vulnerability (GHSA-h8r8-wccr-v5f2)
A critical mutation-based cross-site scripting (mXSS) vulnerability in the widely-used DOMPurify library has prompted an urgent security update to version 3.3.2. The flaw, tracked as GHSA-h8r8-wccr-v5f2, was confirmed when sanitized HTML could be mutated by a browser's parser into a malicious form, potentially bypassing the library's core security protections. This type of vulnerability is particularly dangerous as it can allow attackers to inject and execute scripts in contexts where user input was believed to be safely sanitized, impacting any application relying on DOMPurify for HTML purification.
The vulnerability advisory was issued directly by the DOMPurify maintainers at Cure53, a renowned security firm. The update from version 3.3.1 to 3.3.2 is classified as a patch-level change, indicating a focused fix for a specific security issue rather than a feature release. The dependency management bot Renovate has flagged this update as high-priority, automatically generating pull requests across countless projects to integrate the patched version. This automated response highlights the severity and broad potential impact of the flaw within the software supply chain.
For development teams, the immediate imperative is to merge this update and conduct rigorous post-merge testing. Standard protocol includes running the full test suite (`npm test`), rebuilding the application, and manually verifying that content scripts function correctly on major AI platforms like Claude, ChatGPT, and Perplexity. Failure to promptly apply this patch leaves web applications exposed to a stealthy form of XSS attack that could compromise user data and session integrity. The rapid, automated dissemination of this fix underscores the critical role of dependency management tools in modern cybersecurity response.