Update dependency fast-xml-parser to v5.7.0 [SECURITY]#4226
Open
renovate[bot] wants to merge 1 commit intomasterfrom
Open
Update dependency fast-xml-parser to v5.7.0 [SECURITY]#4226renovate[bot] wants to merge 1 commit intomasterfrom
renovate[bot] wants to merge 1 commit intomasterfrom
Conversation
Deploying piped with
|
| Latest commit: |
4169d54
|
| Status: | ✅ Deploy successful! |
| Preview URL: | https://3b184cc4.piped.pages.dev |
| Branch Preview URL: | https://renovate-npm-fast-xml-parser.piped.pages.dev |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
5.5.12→5.7.0fast-xml-parser XMLBuilder: XML Comment and CDATA Injection via Unescaped Delimiters
CVE-2026-41650 / GHSA-gh4j-gqv2-49f6
More information
Details
fast-xml-parser XMLBuilder: Comment and CDATA Injection via Unescaped Delimiters
Summary
fast-xml-parser XMLBuilder does not escape the
-->sequence in comment content or the]]>sequence in CDATA sections when building XML from JavaScript objects. This allows XML injection when user-controlled data flows into comments or CDATA elements, leading to XSS, SOAP injection, or data manipulation.Existing CVEs for fast-xml-parser cover different issues:
This finding covers unescaped comment/CDATA delimiters in XMLBuilder - a distinct vulnerability.
Vulnerable Code
File:
src/fxb.jsCompare with attribute/text escaping which IS properly handled via
replaceEntitiesValue().Proof of Concept
Test 1: Comment Injection (XSS in SVG/HTML context)
Output:
Test 2: CDATA Injection (RSS feed)
Output:
Test 3: SOAP Message Injection
Output:
The injected
<Action>deleteAll</Action>appears as a real SOAP action element.Tested Output
All tests run on Node.js v22, fast-xml-parser v5.5.12:
Impact
An attacker who controls data that flows into XML comments or CDATA sections via XMLBuilder can:
<script>tags into XML/SVG/HTML documents served to browsersThis is practically exploitable whenever applications use XMLBuilder to generate XML from data that includes user-controlled content in comments or CDATA (e.g., RSS feeds, SOAP services, SVG generation, config files).
Suggested Fix
Escape delimiters in comment and CDATA content:
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
Release Notes
NaturalIntelligence/fast-xml-parser (fast-xml-parser)
v5.7.0Compare Source
v5.6.0Compare Source
Configuration
📅 Schedule: (UTC)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.