Skip to content

chore(deps): update dependency fast-xml-parser to v5.3.6 [security]#13552

Merged
LukasHirt merged 1 commit intomasterfrom
renovate/npm-fast-xml-parser-vulnerability
Feb 26, 2026
Merged

chore(deps): update dependency fast-xml-parser to v5.3.6 [security]#13552
LukasHirt merged 1 commit intomasterfrom
renovate/npm-fast-xml-parser-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Jan 31, 2026

This PR contains the following updates:

Package Change Age Confidence
fast-xml-parser 5.3.55.3.6 age confidence

GitHub Vulnerability Alerts

CVE-2026-26278

Summary

The XML parser can be forced to do an unlimited amount of entity expansion. With a very small XML input, it’s possible to make the parser spend seconds or even minutes processing a single request, effectively freezing the application.

Details

There is a check in DocTypeReader.js that tries to prevent entity expansion attacks by rejecting entities that reference other entities (it looks for & inside entity values). This does stop classic “Billion Laughs” payloads.

However, it doesn’t stop a much simpler variant.

If you define one large entity that contains only raw text (no & characters) and then reference it many times, the parser will happily expand it every time. There is no limit on how large the expanded result can become, or how many replacements are allowed.

The problem is in replaceEntitiesValue() inside OrderedObjParser.js. It repeatedly runs val.replace() in a loop, without any checks on total output size or execution cost. As the entity grows or the number of references increases, parsing time explodes.

Relevant code:

DocTypeReader.js (lines 28–33): entity registration only checks for &

OrderedObjParser.js (lines 439–458): entity replacement loop with no limits

PoC

const { XMLParser } = require('fast-xml-parser');

const entity = 'A'.repeat(1000);
const refs = '&big;'.repeat(100);
const xml = `<!DOCTYPE foo [<!ENTITY big "${entity}">]><root>${refs}</root>`;

console.time('parse');
new XMLParser().parse(xml); // ~4–8 seconds for ~1.3 KB of XML
console.timeEnd('parse');

// 5,000 chars × 100 refs takes 200+ seconds
// 50,000 chars × 1,000 refs will hang indefinitely

Impact

This is a straightforward denial-of-service issue.

Any service that parses user-supplied XML using the default configuration is vulnerable. Since Node.js runs on a single thread, the moment the parser starts expanding entities, the event loop is blocked. While this is happening, the server can’t handle any other requests.

In testing, a payload of only a few kilobytes was enough to make a simple HTTP server completely unresponsive for several minutes, with all other requests timing out.

Workaround

Avoid using DOCTYPE parsing by processEntities: false option.


Release Notes

NaturalIntelligence/fast-xml-parser (fast-xml-parser)

v5.3.6: Entity security and performance

Compare Source

  • Improve security and performance of entity processing
    • new options maxEntitySize, maxExpansionDepth, maxTotalExpansions, maxExpandedLength, allowedTags,tagFilter
    • fast return when no edtity is present
    • improvement replacement logic to reduce number of calls

Full Changelog: NaturalIntelligence/fast-xml-parser@v5.3.5...v5.3.6


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@update-docs
Copy link
Copy Markdown

update-docs Bot commented Jan 31, 2026

Thanks for opening this pull request! The maintainers of this repository would appreciate it if you would create a changelog item based on your changes.

@renovate renovate Bot force-pushed the renovate/npm-fast-xml-parser-vulnerability branch from 3579e76 to 43d2957 Compare February 2, 2026 16:54
@renovate renovate Bot force-pushed the renovate/npm-fast-xml-parser-vulnerability branch from 43d2957 to 335bc90 Compare February 26, 2026 08:41
@renovate renovate Bot changed the title chore(deps): update dependency fast-xml-parser to v5.3.4 [security] chore(deps): update dependency fast-xml-parser to v5.3.6 [security] Feb 26, 2026
@sonarqubecloud
Copy link
Copy Markdown

@LukasHirt LukasHirt merged commit 7330be8 into master Feb 26, 2026
4 checks passed
@LukasHirt LukasHirt deleted the renovate/npm-fast-xml-parser-vulnerability branch February 26, 2026 09:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant