Description
“fast-xml-parser” allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for DoS attacks.
Recommendation
Update the fast-xml-parser package to the latest compatible version. Followings are version details:
- Affected version(s): >= 4.1.3, < 4.2.4
- Patched version(s): 4.2.4
References
Related Issues
- Bootstrap Cross-site Scripting vulnerability (GHSA-pj7m-g53m-7638) - CVE-2018-14041
- Nuxt has Client-Side Path Traversal in Nuxt Island Payload Revival - CVE-2025-59414
- @astrojs/node's trailing slash handling causes open redirect issue - CVE-2025-55207
- Linkify Allows Prototype Pollution & HTML Attribute Injection (XSS) - CVE-2025-8101
- Tags:
- npm
- fast-xml-parser
Anything's wrong? Let us know Last updated on January 25, 2024