fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 4.3.6 through 5.3.3, a RangeError vulnerability exists in the numeric entity processing of fast-xml-parser when parsing XML with out-of-range entity code points (e.g., `�` or `�`). This causes the parser to throw an uncaught exception, crashing any application that processes untrusted XML input. Version 5.3.4 fixes the issue.
References
Configurations
No configuration.
History
30 Jan 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-30 16:16
Updated : 2026-01-30 16:16
NVD link : CVE-2026-25128
Mitre link : CVE-2026-25128
CVE.ORG link : CVE-2026-25128
JSON object : View
Products Affected
No product.
