fast-xml-parser regex vulnerability patch could be improved from a safety perspective
- Severity:
- Low
Description
This is a comment on https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw and the patches fixing it.
Recommendation
Update the fast-xml-parser package to the latest compatible version. Followings are version details:
- Affected version(s): = 4.2.4
- Patched version(s): 4.2.5
References
Related Issues
- fast-xml-parser vulnerable to Regex Injection via Doctype Entities - CVE-2023-34104
- fast-xml-parser vulnerable to Prototype Pollution through tag or attribute name - CVE-2023-26920
- fast-xml-parser has RangeError DoS Numeric Entities Bug - CVE-2026-25128
- fast-xml-parser vulnerable to ReDOS at currency parsing - CVE-2024-41818
- Tags:
- npm
- fast-xml-parser
Anything's wrong? Let us know Last updated on November 29, 2023