Home

Description

fast-xml-parser allows users to process XML from JS object without C/C++ based libraries or callbacks. Prior to version 5.7.0, XMLBuilder does not escape the "-->" sequence in comment content or the "]]>" sequence in CDATA sections when building XML from JavaScript objects. This allows XML injection when user-controlled data flows into comments or CDATA elements, leading to XSS, SOAP injection, or data manipulation. This issue has been patched in version 5.7.0.

PUBLISHED Reserved 2026-04-21 | Published 2026-05-07 | Updated 2026-05-07 | Assigner GitHub_M




MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-91: XML Injection (aka Blind XPath Injection)

Product status

< 5.7.0
affected

References

github.com/...parser/security/advisories/GHSA-gh4j-gqv2-49f6 exploit

github.com/...parser/security/advisories/GHSA-gh4j-gqv2-49f6

github.com/...telligence/fast-xml-parser/releases/tag/v5.6.0

cve.org (CVE-2026-41650)

nvd.nist.gov (CVE-2026-41650)

Download JSON