Metrics
Affected Vendors & Products
Mon, 23 Feb 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:svelte:svelte:*:*:*:*:*:node.js:*:* | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 23 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Svelte
Svelte svelte |
|
| Vendors & Products |
Svelte
Svelte svelte |
Sat, 21 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1286 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 20 Feb 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | svelte performance oriented web framework. Prior to 5.51.5, when using <svelte:element this={tag}> in server-side rendering, the provided tag name is not validated or sanitized before being emitted into the HTML output. If the tag string contains unexpected characters, it can result in HTML injection in the SSR output. Client-side rendering is not affected. This vulnerability is fixed in 5.51.5. | |
| Title | Svelte SSR does not validate dynamic element tag names in `<svelte:element>` | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-23T19:23:03.403Z
Reserved: 2026-02-17T18:42:27.043Z
Link: CVE-2026-27122
Updated: 2026-02-23T19:22:53.632Z
Status : Analyzed
Published: 2026-02-20T23:16:02.640
Modified: 2026-02-23T20:53:01.857
Link: CVE-2026-27122