- Description
- fast-xml-parser allows users to process XML from JS object without C/C++ based libraries or callbacks. Versions 4.0.0-beta.3 through 5.5.5 contain a bypass vulnerability where numeric character references (&#NNN;, &#xHH;) and standard XML entities completely evade the entity expansion limits (e.g., maxTotalExpansions, maxExpandedLength) added to fix CVE-2026-26278, enabling XML entity expansion Denial of Service. The root cause is that replaceEntitiesValue() in OrderedObjParser.js only enforces expansion counting on DOCTYPE-defined entities while the lastEntities loop handling numeric/standard entities performs no counting at all. An attacker supplying 1M numeric entity references like A can force ~147MB of memory allocation and heavy CPU usage, potentially crashing the process—even when developers have configured strict limits. This issue has been fixed in version 5.5.6.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
- Products
- fast-xml-parser
CVSS 3.1
- Type
- Secondary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
- security-advisories@github.com
- CWE-776
- Hype score
- Not currently trending
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:naturalintelligence:fast-xml-parser:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9177BC-BACD-4367-9063-398ACE2AB4A7",
"versionEndExcluding": "5.5.6",
"versionStartIncluding": "4.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:naturalintelligence:fast-xml-parser:4.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "2398B145-2ED8-4197-8838-FAE7AD7666E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:naturalintelligence:fast-xml-parser:4.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "44B6C4BE-69F4-4651-80EE-055D1F99F7EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:naturalintelligence:fast-xml-parser:4.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "4B32E8C4-15A7-466D-98A7-9EDD6B45F883",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:naturalintelligence:fast-xml-parser:4.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "23CDA792-75FA-48A7-8577-4266A0BFB3A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:naturalintelligence:fast-xml-parser:4.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "D4B7FD7D-0059-4D5B-898D-539AB43AA24A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:naturalintelligence:fast-xml-parser:4.0.0:beta7:*:*:*:*:*:*",
"matchCriteriaId": "42844DDE-AD5B-4684-8104-1C2D133C6098",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:naturalintelligence:fast-xml-parser:4.0.0:beta8:*:*:*:*:*:*",
"matchCriteriaId": "C045B7F2-16A9-47C9-B08D-71847A940B93",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]