Description
A RangeError vulnerability exists in the numeric entity processing of fast-xml-parser when parsing XML with out-of-range entity code points (e.g., � or �). This causes the parser to throw an uncaught exception, crashing any application that processes untrusted XML input.
Recommendation
Update the fast-xml-parser package to the latest compatible version. Followings are version details:
- Affected version(s): >= 4.3.6, <= 5.3.3
- Patched version(s): 5.3.4
References
Related Issues
- fast-xml-parser vulnerable to Regex Injection via Doctype Entities - CVE-2023-34104
- fast-xml-parser vulnerable to Prototype Pollution through tag or attribute name - CVE-2023-26920
- fast-xml-parser vulnerable to ReDOS at currency parsing - CVE-2024-41818
- fast-xml-parser regex vulnerability patch could be improved from a safety perspective - Vulnerability
- Tags:
- npm
- fast-xml-parser
Anything's wrong? Let us know Last updated on January 30, 2026