Description
“fast-xml-parser” allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for DoS attacks.
Recommendation
Update the fast-xml-parser
package to the latest compatible version. Followings are version details:
- Affected version(s): >= 4.1.3, < 4.2.4
- Patched version(s): 4.2.4
References
Related Issues
- Nuxt has Client-Side Path Traversal in Nuxt Island Payload Revival - CVE-2025-59414
- Linkify Allows Prototype Pollution & HTML Attribute Injection (XSS) - CVE-2025-8101
- Marked allows Regular Expression Denial of Service (ReDoS) attacks - CVE-2018-25110
- tarteaucitron.js allows url scheme injection via unfiltered inputs - CVE-2025-31476
- Tags:
- npm
- fast-xml-parser
Anything's wrong? Let us know Last updated on January 25, 2024