Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-25896

Опубликовано: 20 фев. 2026
Источник: redhat
CVSS3: 7.1
EPSS Низкий

Описание

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. From 4.1.3to before 5.3.5, a dot (.) in a DOCTYPE entity name is treated as a regex wildcard during entity replacement, allowing an attacker to shadow built-in XML entities (<, >, &, ", ') with arbitrary values. This bypasses entity encoding and leads to XSS when parsed output is rendered. This vulnerability is fixed in 5.3.5.

A flaw was found in fast-xml-parser. A remote attacker can exploit this vulnerability by providing a specially crafted XML input. The system incorrectly interprets a dot in a DOCTYPE entity name as a regular expression wildcard during processing. This allows the attacker to bypass security measures and inject malicious scripts, resulting in Cross-Site Scripting (XSS) when the parsed output is displayed to users.

Отчет

This flaw has been assessed as IMPORTANT for Red Hat products. This vulnerability arises when the parsed XML output is subsequently rendered to users which requires the interaction of the user. The impact of this flaw is also limited to the user's browser context.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Migration Toolkit for Applications 8mta/mta-ui-rhel9Affected
Red Hat Advanced Cluster Security 4advanced-cluster-security/rhacs-main-rhel8Affected
Red Hat Developer Hubrhdh/rhdh-hub-rhel9Affected
Red Hat Openshift Data Foundation 4odf4/mcg-core-rhel9Affected
Red Hat Openshift Data Foundation 4odf4/ocs-client-console-rhel9Affected
Red Hat Openshift Data Foundation 4odf4/odf-console-rhel9Affected
Red Hat Openshift Data Foundation 4odf4/odf-multicluster-console-rhel9Not affected
Red Hat OpenShift GitOpsopenshift-gitops-1/argocd-rhel8Affected
Red Hat OpenShift GitOpsopenshift-gitops-1/argocd-rhel9Affected
Red Hat OpenShift Virtualization 4container-native-virtualization/kubevirt-console-pluginAffected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-79
https://bugzilla.redhat.com/show_bug.cgi?id=2441501fast-xml-parser: fast-xml-parser: Cross-Site Scripting (XSS) due to improper DOCTYPE entity handling

EPSS

Процентиль: 3%
0.00014
Низкий

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 9.3
ubuntu
около 1 месяца назад

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. From 4.1.3to before 5.3.5, a dot (.) in a DOCTYPE entity name is treated as a regex wildcard during entity replacement, allowing an attacker to shadow built-in XML entities (&lt;, &gt;, &amp;, &quot;, &apos;) with arbitrary values. This bypasses entity encoding and leads to XSS when parsed output is rendered. This vulnerability is fixed in 5.3.5.

CVSS3: 9.3
nvd
около 1 месяца назад

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. From 4.1.3to before 5.3.5, a dot (.) in a DOCTYPE entity name is treated as a regex wildcard during entity replacement, allowing an attacker to shadow built-in XML entities (&lt;, &gt;, &amp;, &quot;, &apos;) with arbitrary values. This bypasses entity encoding and leads to XSS when parsed output is rendered. This vulnerability is fixed in 5.3.5.

CVSS3: 9.3
debian
около 1 месяца назад

fast-xml-parser allows users to validate XML, parse XML to JS object, ...

CVSS3: 9.3
github
около 1 месяца назад

fast-xml-parser has an entity encoding bypass via regex injection in DOCTYPE entity names

EPSS

Процентиль: 3%
0.00014
Низкий

7.1 High

CVSS3