fast-xml-parser has an entity encoding bypass via regex injection in DOCTYPE entity names
- Severity:
- High
Description
No description available.
Recommendation
Update the fast-xml-parser package to the latest compatible version. Followings are version details:
Affected version(s): **>= 4.1.3, < 4.5.4 >= 5.0.0, < 5.3.5** Patched version(s): **4.5.4 5.3.5**
References
Related Issues
- fast-xml-parser vulnerable to Regex Injection via Doctype Entities - CVE-2023-34104
- fast-xml-parser affected by DoS through entity expansion in DOCTYPE (no expansion limit) - CVE-2026-26278
- fast-xml-parser affected by numeric entity expansion bypassing all entity expansion limits (incomplete fix for CVE-2026- - CVE-2026-33036
- Entity Expansion Limits Bypassed When Set to Zero Due to JavaScript Falsy Evaluation in fast-xml-parser - CVE-2026-33349
- Tags:
- npm
- fast-xml-parser
Anything's wrong? Let us know Last updated on February 27, 2026