CVE-2026-25896

CRITICAL

fast-xml-parser 4.1.3-5.3.4 - XSS

Title source: llm
STIX 2.1

Description

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. From 4.1.3to before 5.3.5, a dot (.) in a DOCTYPE entity name is treated as a regex wildcard during entity replacement, allowing an attacker to shadow built-in XML entities (<, >, &, ", ') with arbitrary values. This bypasses entity encoding and leads to XSS when parsed output is rendered. This vulnerability is fixed in 5.3.5.

Scores

CVSS v3 9.3
EPSS 0.0002
EPSS Percentile 5.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-185
Status published
Products (2)
naturalintelligence/fast-xml-parser 4.1.3 - 5.3.5
npm/fast-xml-parser 5.0.0 - 5.3.5npm
Published Feb 20, 2026
Tracked Since Feb 21, 2026