Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jmr7-xgp7-cmfj | fast-xml-parser affected by DoS through entity expansion in DOCTYPE (no expansion limit) |
Mon, 23 Feb 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:naturalintelligence:fast-xml-parser:*:*:*:*:*:*:*:* |
Fri, 20 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Naturalintelligence
Naturalintelligence fast-xml-parser |
|
| Vendors & Products |
Naturalintelligence
Naturalintelligence fast-xml-parser |
Fri, 20 Feb 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 4.1.3 through 5.3.5, the XML parser can be forced to do an unlimited amount of entity expansion. With a very small XML input, it’s possible to make the parser spend seconds or even minutes processing a single request, effectively freezing the application. Version 5.3.6 fixes the issue. As a workaround, avoid using DOCTYPE parsing by `processEntities: false` option. | |
| Title | fast-xml-parser affected by DoS through entity expansion in DOCTYPE (no expansion limit) | |
| Weaknesses | CWE-776 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-02T19:11:59.388Z
Reserved: 2026-02-12T17:10:53.414Z
Link: CVE-2026-26278
Updated: 2026-02-19T20:58:41.932Z
Status : Analyzed
Published: 2026-02-19T20:25:43.717
Modified: 2026-02-23T19:30:26.017
Link: CVE-2026-26278
OpenCVE Enrichment
Updated: 2026-04-16T17:00:09Z
Github GHSA