Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. fast-xml-parser
  4. ›
  5. CVE-2026-25896

CVE-2026-25896: fast-xml-parser has an entity encoding bypass via regex injection in DOCTYPE entity names

February 20, 2026 (updated February 27, 2026)

A dot (.) in a DOCTYPE entity name is treated as a regex wildcard during entity replacement, allowing an attacker to shadow built-in XML entities (<, >, &, ", ') with arbitrary values. This bypasses entity encoding and leads to XSS when parsed output is rendered.

References

  • github.com/NaturalIntelligence/fast-xml-parser
  • github.com/NaturalIntelligence/fast-xml-parser/commit/943ef0eb1b2d3284e72dd74f44a042ee9f07026e
  • github.com/NaturalIntelligence/fast-xml-parser/commit/ddcd0acf26ddd682cb0dc15a2bd6aa3b96bb1e69
  • github.com/NaturalIntelligence/fast-xml-parser/releases/tag/v5.3.5
  • github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-m7jm-9gc2-mpf2
  • github.com/advisories/GHSA-m7jm-9gc2-mpf2
  • nvd.nist.gov/vuln/detail/CVE-2026-25896

Code Behaviors & Features

Detect and mitigate CVE-2026-25896 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 4.1.3 before 4.5.4, all versions starting from 5.0.0 before 5.3.5

Fixed versions

  • 5.3.5
  • 4.5.4

Solution

Upgrade to versions 4.5.4, 5.3.5 or above.

Impact 9.3 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-185: Incorrect Regular Expression

Source file

npm/fast-xml-parser/CVE-2026-25896.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 28 Feb 2026 00:19:05 +0000.