Chrome Zero-Day Actively Exploited; Critical JavaScript Library Flaws Patched

This newsletter is AI generated and may hallucinate sometimes 😊

CISA Warns of Actively Exploited Chrome Zero-Day Vulnerability

  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding an actively exploited zero-day vulnerability in Google Chrome.
  • This critical flaw, identified as a type of use-after-free (UAF) in the V8 JavaScript engine, allows remote attackers to execute arbitrary code or cause a denial of service.
  • Users are urged to update their Chrome browsers to the latest stable version immediately to mitigate the risk of ongoing exploitation.

Source: Cybersecurity News | Date: April 02, 2026

xmldom Library Vulnerability Exposes Millions to XML Injection (CVE-2026-34601)

  • A critical XML injection vulnerability, identified as CVE-2026-34601, has been discovered in the xmldom JavaScript library, impacting an estimated 23 million weekly users.
  • The flaw specifically allows for CDATA section bypass, enabling attackers to inject arbitrary XML content into parsed documents, potentially leading to data manipulation or denial of service.
  • Developers are strongly advised to update to xmldom version 0.8.0 or later, which includes the patch addressing this high-severity issue.

Source: SecurityOnline.info | Date: April 02, 2026

References

  1. CISA Warns of Chrome 0-Day Vulnerability Actively Exploited in Attacks - Cybersecurity News
  2. Lodash Patches High-Severity Code Injection Vulnerability - SecurityOnline.info
  3. The xmldom CDATA Flaw That Puts 23 Million Weekly Users at Risk - SecurityOnline.info

Read more