files/en-us/web/api/document/parsehtml_static/index.md
{{APIRef("DOM")}}{{SeeCompatTable}}
The parseHTML() static method of the {{domxref("Document")}} object provides an XSS-safe method to parse and sanitize a string of HTML in order to create a new {{domxref("Document")}} instance.
Document.parseHTML(input)
Document.parseHTML(input, options)
input
options {{optional_inline}}
sanitizer
: A {{domxref("Sanitizer")}} or {{domxref("SanitizerConfig")}} object which defines what elements of the input will be allowed or removed, or the string "default" for the default sanitizer configuration.
The method will remove any XSS-unsafe elements and attributes, even if allowed by the sanitizer.
If not specified, the default Sanitizer configuration is used.
Note that if you're using the same configuration multiple times, it's expected to be more efficient to use a Sanitizer and modify it when you need to.
A {{domxref("Document")}}.
TypeError
options.sanitizer is passed a:
"default".The parseHTML() method parses and sanitize a string of HTML in order to create a new {{domxref("Document")}} instance that is XSS-safe.
The resulting Document will have a content type of "text/html", a character set of UTF-8, and a URL of "about:blank".
If no sanitizer is specified in the options.sanitizer parameter, parseHTML() is used with the default sanitizer configuration.
This configuration is suitable for the majority of use cases as it prevents XSS attacks, as well as other attacks like clickjacking or spoofing.
A custom Sanitizer or SanitizerConfig can be specified to choose which elements, attributes, and comments are allowed or removed.
Note that even if unsafe options are allowed by the sanitizer, they will still be removed when using this method (it removes the same elements as a sanitizer on which {{domxref('Sanitizer.removeUnsafe()')}} has been called).
The input HTML may include declarative shadow roots. If the string of HTML defines more than one declarative shadow root in a particular shadow host then only the first {{domxref("ShadowRoot")}} is created — subsequent declarations are parsed as {{htmlelement("template")}} elements within that shadow root.
parseHTML() should be used instead of {{domxref("Document.parseHTMLUnsafe_static", "Document.parseHTMLUnsafe()")}}, unless there is a specific need to allow unsafe elements and attributes.
If the HTML to be parsed doesn't need to contain unsafe HTML entities, then you should use Document.parseHTML().
Note that since this method always sanitizes input strings of XSS-unsafe entities, it is not secured or validated using the Trusted Types API.
{{Specifications}}
{{Compat}}