Permissive List of Allowed Inputs Affecting express-xss-sanitizer package, versions >=1.2.0 <2.0.2


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-EXPRESSXSSSANITIZER-15809193
  • published29 Mar 2026
  • disclosed27 Mar 2026
  • creditLissy93

Introduced: 27 Mar 2026

NewCVE-2026-33979  (opens in a new tab)
CWE-183  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade express-xss-sanitizer to version 2.0.2 or higher.

Overview

express-xss-sanitizer is an Express 4.x middleware which sanitizes user input data (in req.body, req.query, req.headers and req.params) to prevent Cross Site Scripting (XSS) attack.

Affected versions of this package are vulnerable to Permissive List of Allowed Inputs through the initializeOptions function in lib/sanitize.js. An attacker can inject unintended HTML and XSS payloads by supplying content expected to be fully stripped when allowedTags or allowedAttributes are empty, causing a fallback to sanitize-html defaults instead of enforcing a deny-all configuration.

Notes

  • The vulnerable behavior affects applications using express-xss-sanitizer to sanitize untrusted input from request data such as req.body, req.query, req.headers, or req.params.

CVSS Base Scores

version 4.0
version 3.1