Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gh4j-gqv2-49f6 | fast-xml-parser XMLBuilder: XML Comment and CDATA Injection via Unescaped Delimiters |
Tue, 12 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:naturalintelligence:fast-xml-parser:*:*:*:*:*:*:*:* |
Thu, 07 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Naturalintelligence
Naturalintelligence fast-xml-parser |
|
| Vendors & Products |
Naturalintelligence
Naturalintelligence fast-xml-parser |
Thu, 07 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | fast-xml-parser allows users to process XML from JS object without C/C++ based libraries or callbacks. Prior to version 5.7.0, XMLBuilder does not escape the "-->" sequence in comment content or the "]]>" sequence in CDATA sections when building XML from JavaScript objects. This allows XML injection when user-controlled data flows into comments or CDATA elements, leading to XSS, SOAP injection, or data manipulation. This issue has been patched in version 5.7.0. | |
| Title | fast-xml-parser XMLBuilder: XML Comment and CDATA Injection via Unescaped Delimiters | |
| Weaknesses | CWE-91 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-07T15:08:36.208Z
Reserved: 2026-04-21T23:58:43.802Z
Link: CVE-2026-41650
Updated: 2026-05-07T15:06:59.881Z
Status : Analyzed
Published: 2026-05-07T15:16:07.767
Modified: 2026-05-12T20:30:29.623
Link: CVE-2026-41650
No data.
OpenCVE Enrichment
Updated: 2026-05-07T16:45:33Z
Github GHSA