{"id":"CVE-2026-25896","summary":"fast-xml-parser has an entity encoding bypass via regex injection in DOCTYPE entity names","details":"fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. From 4.1.3to before 5.3.5, a dot (.) in a DOCTYPE entity name is treated as a regex wildcard during entity replacement, allowing an attacker to shadow built-in XML entities (&lt;, &gt;, &amp;, &quot;, &apos;) with arbitrary values. This bypasses entity encoding and leads to XSS when parsed output is rendered. This vulnerability is fixed in 5.3.5.","aliases":["GHSA-m7jm-9gc2-mpf2"],"modified":"2026-04-10T05:40:48.062864Z","published":"2026-02-20T20:57:48.074Z","related":["CGA-cc3j-p958-wmp4"],"database_specific":{"cwe_ids":["CWE-185"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25896.json","cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://github.com/NaturalIntelligence/fast-xml-parser/releases/tag/v5.3.5"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25896.json"},{"type":"ADVISORY","url":"https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-m7jm-9gc2-mpf2"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-25896"},{"type":"FIX","url":"https://github.com/NaturalIntelligence/fast-xml-parser/commit/943ef0eb1b2d3284e72dd74f44a042ee9f07026e"},{"type":"FIX","url":"https://github.com/NaturalIntelligence/fast-xml-parser/commit/ddcd0acf26ddd682cb0dc15a2bd6aa3b96bb1e69"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/naturalintelligence/fast-xml-parser","events":[{"introduced":"2f7d138af8338aaf65c1d98902f76259c7233373"},{"fixed":"fe9a85270122036ae22637167ce38a5f71b73a5f"}],"database_specific":{"versions":[{"introduced":"5.0.0"},{"fixed":"5.3.5"}]}},{"type":"GIT","repo":"https://github.com/naturalintelligence/fast-xml-parser","events":[{"introduced":"292fb784334043214e29fa60adbb5630a36f5768"},{"fixed":"d4eb6b4713a8d11e6730943392419040898ecbc0"}],"database_specific":{"versions":[{"introduced":"4.1.3"},{"fixed":"4.5.4"}]}}],"versions":["v4.1.3","v4.1.4","v4.2.0","v4.2.3","v4.2.4","v4.2.5","v4.2.6","v4.2.7","v4.3.0","v4.3.1","v4.3.2","v4.3.3","v4.3.4","v4.3.5","v4.3.6","v4.4.0","v4.4.1","v4.5.0","v4.5.1","v4.5.2","v4.5.3","v5.0.0","v5.0.2","v5.0.4","v5.0.6","v5.0.7","v5.0.9","v5.1.0","v5.2.0","v5.2.1","v5.2.2","v5.2.3","v5.2.5","v5.3.0","v5.3.1","v5.3.2","v5.3.3","v5.3.4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25896.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:N"}]}