WhisperX tag archive

#CVE-2026-0540

This page collects WhisperX intelligence signals tagged #CVE-2026-0540. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (4)

The Network · 2026-03-05 10:42:52 · ai

1. DOMPurify XSS Bypass in XML Mode — No Patch Available (CVE-2026-0540)

A medium severity Cross-Site Scripting (XSS) bypass vulnerability exists in DOMPurify versions 3.1.3 through 3.3.1. The vulnerability, tracked as CVE-2026-0540 and GHSA-v2wj-7wpq-c8vv, affects the library's `SAFE_FOR_XML` sanitization mode. The flaw stems from missing protection for five rawtext HTML elements (`noscrip...

The Lab · 2026-03-25 20:27:22 · GitHub Issues

2. DOMPurify Security Patch: Critical XSS Bypass in Widespread HTML Sanitizer (CVE-2026-0540)

A critical security vulnerability in DOMPurify, a widely-used HTML sanitization library, has been patched after exposing countless web applications to cross-site scripting (XSS) attacks. The flaw, tracked as CVE-2026-0540, allowed attackers to bypass the library's core security filters by exploiting a specific oversigh...

The Lab · 2026-04-08 00:27:01 · GitHub Issues

3. CVE-2026-0540: DOMPurify Sanitization Bypass Exposes closenow.ai to XSS Risk

A critical sanitization bypass in the widely-used DOMPurify library has been identified, exposing applications like closenow.ai to cross-site scripting (XSS) attacks. The vulnerability, tracked as CVE-2026-0540, stems from a flawed regular expression that fails to properly sanitize five specific rawtext HTML elements: ...

The Lab · 2026-04-08 17:27:23 · GitHub Issues

4. DOMPurify Security Patch: Critical XSS Bypass in Versions 3.1.3-3.3.1 Fixed in v3.3.2

A critical cross-site scripting (XSS) vulnerability in the widely-used DOMPurify HTML sanitization library has been patched, forcing a mandatory update for thousands of dependent applications. The flaw, tracked as CVE-2026-0540, allowed attackers to bypass the library's core security filters by exploiting a specific ov...