Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 30 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Jan 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 4.3.6 through 5.3.3, a RangeError vulnerability exists in the numeric entity processing of fast-xml-parser when parsing XML with out-of-range entity code points (e.g., `�` or `�`). This causes the parser to throw an uncaught exception, crashing any application that processes untrusted XML input. Version 5.3.4 fixes the issue. | |
| Title | fast-xml-parser has RangeError DoS Numeric Entities Bug | |
| Weaknesses | CWE-20 CWE-248 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-30T15:40:55.259Z
Reserved: 2026-01-29T14:03:42.540Z
Link: CVE-2026-25128
Updated: 2026-01-30T15:40:48.124Z
Status : Received
Published: 2026-01-30T16:16:14.123
Modified: 2026-01-30T16:16:14.123
Link: CVE-2026-25128
No data.
OpenCVE Enrichment
No data.