top of page
perceptive_background_267k.jpg

SVGO, short for SVG Optimizer, is a Node.js library and command-line application for optimizing SVG files. From version 2.1.0 to before version 2.8.1, from vers…

Published:

5 March 2026 at 23:00:00

Alert date:

6 March 2026 at 09:02:49

Source:

nvd.nist.gov

Click to open the original link from this advisory

Supply Chain & Dependencies, Web Technologies

SVGO (SVG Optimizer), a Node.js library and command-line application for optimizing SVG files, contains a vulnerability in multiple version ranges that allows XML entity expansion attacks. The vulnerability affects versions 2.1.0 to before 2.8.1, 3.0.0 to before 3.3.3, and before 4.0.1. SVGO accepts XML with custom entities without proper guards against entity expansion or recursion, which can cause denial of service. An attacker can exploit this with a small XML file (811 bytes) to stall the application and crash the Node.js process with a JavaScript heap out of memory error. The issue has been patched in versions 2.8.1, 3.3.3, and 4.0.1.

Technical details

Mitigation steps:

Affected products:

SVGO
Node.js

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page