{"id":"CVE-2022-39353","summary":"xmldom allows multiple root nodes in a DOM","details":"xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. xmldom parses XML that is not well-formed because it contains multiple top level elements, and adds all root nodes to the `childNodes` collection of the `Document`, without reporting any error or throwing. This breaks the assumption that there is only a single root node in the tree, which led to issuance of CVE-2022-39299 as it is a potential issue for dependents. Update to @xmldom/xmldom@~0.7.7, @xmldom/xmldom@~0.8.4 (dist-tag latest) or @xmldom/xmldom@\u003e=0.9.0-beta.4 (dist-tag next). As a workaround, please one of the following approaches depending on your use case: instead of searching for elements in the whole DOM, only search in the `documentElement`or reject a document with a document that has more then 1 `childNode`.","aliases":["GHSA-crh6-fp67-6883"],"modified":"2026-04-02T08:18:01.702349Z","published":"2022-11-02T00:00:00Z","database_specific":{"cwe_ids":["CWE-1288","CWE-20"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/39xxx/CVE-2022-39353.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/39xxx/CVE-2022-39353.json"},{"type":"ADVISORY","url":"https://github.com/xmldom/xmldom/security/advisories/GHSA-crh6-fp67-6883"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39353"},{"type":"REPORT","url":"https://github.com/jindw/xmldom/issues/150"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00000.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/xmldom/xmldom","events":[{"introduced":"0"},{"last_affected":"c80a161172cc4d8733583bf0cf59abfa589f6d9e"},{"fixed":"fe5b043fd07bbfed7f039b77d0b9e1a1eb832a2a"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.6.0"},{"fixed":"0.7.7"}]}},{"type":"GIT","repo":"https://github.com/xmldom/xmldom","events":[{"introduced":"01672e13958c1b0bff7e42784dbdb3de32566e98"},{"fixed":"27fec1ff2fbc5a57ac3ab372d0a1efa230ece918"}],"database_specific":{"versions":[{"introduced":"0.8.0"},{"fixed":"0.8.4"}]}},{"type":"GIT","repo":"https://github.com/xmldom/xmldom","events":[{"introduced":"0b21623512cf859a6341122524abda5bbf92b44f"},{"fixed":"39bc1fcb5d7593f657349836c219f7b489c45518"}],"database_specific":{"versions":[{"introduced":"0.9.0-beta.1"},{"fixed":"0.9.0-beta.4"}]}}],"versions":["0.2.0","0.2.1","0.3.0","0.4.0","0.5.0","0.6.0","0.8.0","0.8.1","0.8.2","0.8.3","0.9.0","0.9.0-beta.1","0.9.0-beta.10","0.9.0-beta.11","0.9.0-beta.2","0.9.0-beta.3","0.9.0-beta.4","0.9.0-beta.5","0.9.0-beta.6","0.9.0-beta.7","0.9.0-beta.8","0.9.0-beta.9","0.9.1","0.9.2","0.9.3","0.9.4","0.9.5","0.9.6","0.9.7","0.9.8","0.9.9","v0.1.16","v0.1.27","v0.1.28-not-published","v0.1.28-xmldom-alpha","v0.1.29","v0.1.30","v0.1.31","xmldom-aplha@v0.1.28"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-39353.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H"}]}