### [CVE-2024-21541](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21541) ![](https://img.shields.io/static/v1?label=Product&message=dom-iterator&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=org.webjars.npm%3Adom-iterator&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Arbitrary%20Code%20Execution&color=brightgreen) ### Description Versions of the package dom-iterator before 1.0.1 are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval. ### POC #### Reference - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8383166 - https://security.snyk.io/vuln/SNYK-JS-DOMITERATOR-6157199 #### Github No PoCs found on GitHub currently.