CVE-2021-30560
Description
Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A use-after-free in Chrome's XSLT handling (Blink XSLT) allows remote code execution via crafted HTML.
Vulnerability
A use-after-free vulnerability exists in the Blink XSLT component of Google Chrome prior to version 91.0.4472.164. This memory corruption bug is triggered when processing a crafted HTML page that includes XSL transformations. Attackers can exploit this flaw by convincing a user to visit a malicious webpage. The affected versions are all Chrome releases before 91.0.4472.164. The flaw is also present in libxslt versions prior to 1.1.35, as used by Nokogiri < 1.13.2 [1][3].
Exploitation
An attacker requires no special privileges; they only need to host or inject a malicious HTML page that exploits the use-after-free in the XSLT parser. When a victim visits the page with an affected browser, the crafted content triggers the vulnerable code path. No user interaction beyond visiting the page is required. The exploitation may lead to heap corruption that an attacker can leverage for code execution [2][3].
Impact
Successful exploitation allows an attacker to achieve remote code execution (RCE) in the context of the browser process, leading to full compromise of the affected system. The CVSS score of this vulnerability is 8.8 (High) [3]. The impact includes information disclosure, denial of service, and arbitrary code execution. In the context of Nokogiri, applications using untrusted XSL stylesheets to transform XML are vulnerable to denial of service [3].
Mitigation
The vulnerability is fixed in Google Chrome version 91.0.4472.164 and later [2]. For the libxslt library, the fix is included in version 1.1.35 [3]. Nokogiri users should upgrade to version 1.13.2 or later, which vendors the patched libxslt [3]. Users unable to upgrade can compile and link Nokogiri against system libraries with libxslt >= 1.1.35 [3]. No workaround is available for Chrome itself other than updating [2].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
nokogiriRubyGems | < 1.13.2 | 1.13.2 |
Affected products
44- ghsa-coords43 versionspkg:gem/nokogiripkg:rpm/opensuse/chromium&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/chromium&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/chromium&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/libxslt&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/libxslt&distro=openSUSE%20Leap%20Micro%205.3pkg:rpm/opensuse/libxslt&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/libxslt-python&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/opera&distro=openSUSE%20Leap%2015.2%20NonFreepkg:rpm/opensuse/opera&distro=openSUSE%20Leap%2015.3%20NonFreepkg:rpm/opensuse/opera&distro=openSUSE%20Leap%2015.4%20NonFreepkg:rpm/opensuse/ruby3.2-rubygem-nokogiri&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/rubygem-nokogiri&distro=openSUSE%20Tumbleweedpkg:rpm/suse/chromium&distro=SUSE%20Package%20Hub%2015%20SP3pkg:rpm/suse/libxslt&distro=SUSE%20Enterprise%20Storage%207pkg:rpm/suse/libxslt&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-ESPOSpkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Micro%205.3pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP4pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2015%20SP3pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-ESPOSpkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/libxslt&distro=SUSE%20Manager%20Proxy%204.2pkg:rpm/suse/libxslt&distro=SUSE%20Manager%20Server%204.2pkg:rpm/suse/libxslt&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/libxslt&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209
< 1.13.2+ 42 more
- (no CPE)range: < 1.13.2
- (no CPE)range: < 91.0.4472.164-lp152.2.113.2
- (no CPE)range: < 91.0.4472.164-bp153.2.16.1
- (no CPE)range: < 93.0.4577.82-1.1
- (no CPE)range: < 1.1.34-150400.3.3.1
- (no CPE)range: < 1.1.34-150400.3.3.1
- (no CPE)range: < 1.1.37-1.1
- (no CPE)range: < 1.1.32-150000.3.14.1
- (no CPE)range: < 77.0.4054.277-lp152.2.55.1
- (no CPE)range: < 77.0.4054.277-lp153.2.9.1
- (no CPE)range: < 85.0.4341.28-lp154.2.5.1
- (no CPE)range: < 1.13.9-1.7
- (no CPE)range: < 1.13.3-1.1
- (no CPE)range: < 91.0.4472.164-bp153.2.16.1
- (no CPE)range: < 1.1.32-150000.3.14.1
- (no CPE)range: < 1.1.32-150000.3.14.1
- (no CPE)range: < 1.1.32-150000.3.14.1
- (no CPE)range: < 1.1.32-150000.3.14.1
- (no CPE)range: < 1.1.32-150000.3.14.1
- (no CPE)range: < 1.1.32-150000.3.14.1
- (no CPE)range: < 1.1.32-150000.3.14.1
- (no CPE)range: < 1.1.32-150000.3.14.1
- (no CPE)range: < 1.1.34-150400.3.3.1
- (no CPE)range: < 1.1.34-150400.3.3.1
- (no CPE)range: < 1.1.34-150400.3.3.1
- (no CPE)range: < 1.1.32-150000.3.14.1
- (no CPE)range: < 1.1.28-17.15.1
- (no CPE)range: < 1.1.28-17.15.1
- (no CPE)range: < 1.1.28-17.15.1
- (no CPE)range: < 1.1.28-17.15.1
- (no CPE)range: < 1.1.32-150000.3.14.1
- (no CPE)range: < 1.1.32-150000.3.14.1
- (no CPE)range: < 1.1.32-150000.3.14.1
- (no CPE)range: < 1.1.28-17.15.1
- (no CPE)range: < 1.1.28-17.15.1
- (no CPE)range: < 1.1.32-150000.3.14.1
- (no CPE)range: < 1.1.32-150000.3.14.1
- (no CPE)range: < 1.1.32-150000.3.14.1
- (no CPE)range: < 1.1.28-17.15.1
- (no CPE)range: < 1.1.32-150000.3.14.1
- (no CPE)range: < 1.1.32-150000.3.14.1
- (no CPE)range: < 1.1.28-17.15.1
- (no CPE)range: < 1.1.28-17.15.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- github.com/advisories/GHSA-59gp-qqm7-cw4jghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-30560ghsaADVISORY
- security.gentoo.org/glsa/202310-23ghsavendor-advisoryWEB
- www.debian.org/security/2022/dsa-5216ghsavendor-advisoryWEB
- chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop.htmlghsaWEB
- crbug.com/1219209ghsaWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2021-30560.ymlghsaWEB
- github.com/sparklemotion/nokogiri/releases/tag/v1.13.2ghsaWEB
- github.com/sparklemotion/nokogiri/security/advisories/GHSA-fq42-c5rg-92c2ghsaWEB
- lists.debian.org/debian-lts-announce/2022/09/msg00010.htmlghsamailing-listWEB
News mentions
0No linked articles in our index yet.