CVE-2026-25128
EUVD-2026-502630.01.2026, 16:16
fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 5.0.9 through 5.3.3, a RangeError vulnerability exists in the numeric entity processing of fast-xml-parser when parsing XML with out-of-range entity code points (e.g., `�` or `�`). This causes the parser to throw an uncaught exception, crashing any application that processes untrusted XML input. Version 5.3.4 fixes the issue.Enginsight
Awaiting analysis
This vulnerability is currently awaiting analysis.
Debian Releases
Common Weakness Enumeration