Cross-site Scripting (XSS) Affecting kibana-8.19-oci-entrypoint package, versions *


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-MINIMOSLATEST-KIBANA819OCIENTRYPOINT-16310282
  • published28 Apr 2026
  • disclosed23 Apr 2026

Introduced: 23 Apr 2026

NewCVE-2026-41238  (opens in a new tab)
CWE-79  (opens in a new tab)
CWE-1321  (opens in a new tab)

How to fix?

There is no fixed version for Minimos:latest kibana-8.19-oci-entrypoint.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kibana-8.19-oci-entrypoint package and not the kibana-8.19-oci-entrypoint package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

DOMPurify is a DOM-only cross-site scripting sanitizer for HTML, MathML, and SVG. Versions 3.0.1 through 3.3.3 are vulnerable to a prototype pollution-based XSS bypass. When an application uses DOMPurify.sanitize() with the default configuration (no CUSTOM_ELEMENT_HANDLING option), a prior prototype pollution gadget can inject permissive tagNameCheck and attributeNameCheck regex values into Object.prototype, causing DOMPurify to allow arbitrary custom elements with arbitrary attributes — including event handlers — through sanitization. Version 3.4.0 fixes the issue.

CVSS Base Scores

version 3.1