Description
“fast-xml-parser” allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for DoS attacks.
Recommendation
Update the fast-xml-parser package to the latest compatible version. Followings are version details:
- Affected version(s): >= 4.1.3, < 4.2.4
- Patched version(s): 4.2.4
References
Related Issues
- fast-xml-parser vulnerable to Prototype Pollution through tag or attribute name - CVE-2023-26920
- fast-xml-parser vulnerable to ReDOS at currency parsing - CVE-2024-41818
- fast-xml-parser has RangeError DoS Numeric Entities Bug - CVE-2026-25128
- fast-xml-parser regex vulnerability patch could be improved from a safety perspective - Vulnerability
- Tags:
- npm
- fast-xml-parser
Anything's wrong? Let us know Last updated on January 25, 2024