DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. It has been discovered that malicious HTML using special nesting techniques can bypass the depth checking added to DOMPurify in recent releases. It was also possible to use Prototype Pollution to weaken the depth check. This renders dompurify unable to avoid cross site scripting (XSS) attacks. This issue has been addressed in versions 2.5.4 and 3.1.3 of DOMPurify. All users are advised to upgrade. There are no known workarounds for this vulnerability.
This issue has been addressed in the following products: Cryostat 3 on RHEL 8 Via RHSA-2024:7706 https://access.redhat.com/errata/RHSA-2024:7706
This issue has been addressed in the following products: NETWORK-OBSERVABILITY-1.7.0-RHEL-9 Via RHSA-2024:8014 https://access.redhat.com/errata/RHSA-2024:8014
This issue has been addressed in the following products: Red Hat Ansible Automation Platform 2.4 for RHEL 8 Red Hat Ansible Automation Platform 2.4 for RHEL 9 Via RHSA-2024:10762 https://access.redhat.com/errata/RHSA-2024:10762
This issue has been addressed in the following products: Red Hat OpenShift Dev Spaces 3 Containers Via RHSA-2025:0892 https://access.redhat.com/errata/RHSA-2025:0892
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.18 Via RHSA-2025:4019 https://access.redhat.com/errata/RHSA-2025:4019