svelte performance oriented web framework. Prior to 5.51.5, when using <svelte:element this={tag}> in server-side rendering, the provided tag name is not validated or sanitized before being emitted into the HTML output. If the tag string contains unexpected characters, it can result in HTML injection in the SSR output. Client-side rendering is not affected. This vulnerability is fixed in 5.51.5.
References
| Link | Resource |
|---|---|
| https://github.com/sveltejs/svelte/security/advisories/GHSA-m56q-vw4c-c2cp | Vendor Advisory |
Configurations
History
23 Feb 2026, 20:53
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
| References | () https://github.com/sveltejs/svelte/security/advisories/GHSA-m56q-vw4c-c2cp - Vendor Advisory | |
| First Time |
Svelte svelte
Svelte |
|
| CPE | cpe:2.3:a:svelte:svelte:*:*:*:*:*:node.js:*:* |
20 Feb 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-20 23:16
Updated : 2026-02-23 20:53
NVD link : CVE-2026-27122
Mitre link : CVE-2026-27122
CVE.ORG link : CVE-2026-27122
JSON object : View
Products Affected
svelte
- svelte
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
