๐Ÿ” CVE Alert

CVE-2026-33349

MEDIUM 5.9

fast-xml-parser: Entity Expansion Limits Bypassed When Set to Zero Due to JavaScript Falsy Evaluation

CVSS Score
5.9
EPSS Score
0.0%
EPSS Percentile
2th

fast-xml-parser allows users to process XML from JS object without C/C++ based libraries or callbacks. From version 4.0.0-beta.3 to before version 5.5.7, the DocTypeReader in fast-xml-parser uses JavaScript truthy checks to evaluate maxEntityCount and maxEntitySize configuration limits. When a developer explicitly sets either limit to 0 โ€” intending to disallow all entities or restrict entity size to zero bytes โ€” the falsy nature of 0 in JavaScript causes the guard conditions to short-circuit, completely bypassing the limits. An attacker who can supply XML input to such an application can trigger unbounded entity expansion, leading to memory exhaustion and denial of service. This issue has been patched in version 5.5.7.

CWE CWE-1284
Vendor naturalintelligence
Product fast-xml-parser
Published Mar 24, 2026
Last Updated Mar 25, 2026
Stay Ahead of the Next One

Get instant alerts for naturalintelligence fast-xml-parser

Be the first to know when new medium vulnerabilities affecting naturalintelligence fast-xml-parser are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

NaturalIntelligence / fast-xml-parser
>= 4.0.0-beta.3, < 5.5.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-jp2q-39xq-3w4g github.com: https://github.com/NaturalIntelligence/fast-xml-parser/commit/239b64aa1fc5c5455ddebbbb54a187eb68c9fdb7