CVE-2026-25896

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
20/02/2026
Last modified:
02/03/2026

Description

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. From 4.1.3to before 5.3.5, a dot (.) in a DOCTYPE entity name is treated as a regex wildcard during entity replacement, allowing an attacker to shadow built-in XML entities (<, >, &, ", ') with arbitrary values. This bypasses entity encoding and leads to XSS when parsed output is rendered. This vulnerability is fixed in 5.3.5.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:naturalintelligence:fast-xml-parser:*:*:*:*:*:*:*:* 4.1.3 (including) 5.3.5 (excluding)