Chrome Zero-Day Actively Exploited; Critical JavaScript Library Flaws Patched
CISA Warns of Actively Exploited Chrome Zero-Day Vulnerability
- The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding an actively exploited zero-day vulnerability in Google Chrome.
- This critical flaw, identified as a type of use-after-free (UAF) in the V8 JavaScript engine, allows remote attackers to execute arbitrary code or cause a denial of service.
- Users are urged to update their Chrome browsers to the latest stable version immediately to mitigate the risk of ongoing exploitation.
Source: Cybersecurity News | Date: April 02, 2026
xmldom Library Vulnerability Exposes Millions to XML Injection (CVE-2026-34601)
- A critical XML injection vulnerability, identified as CVE-2026-34601, has been discovered in the
xmldomJavaScript library, impacting an estimated 23 million weekly users. - The flaw specifically allows for CDATA section bypass, enabling attackers to inject arbitrary XML content into parsed documents, potentially leading to data manipulation or denial of service.
- Developers are strongly advised to update to
xmldomversion 0.8.0 or later, which includes the patch addressing this high-severity issue.
Source: SecurityOnline.info | Date: April 02, 2026
References
- CISA Warns of Chrome 0-Day Vulnerability Actively Exploited in Attacks - Cybersecurity News
- Lodash Patches High-Severity Code Injection Vulnerability - SecurityOnline.info
- The xmldom CDATA Flaw That Puts 23 Million Weekly Users at Risk - SecurityOnline.info