Incorrect Regular Expression Affecting fast-xml-parser package, versions >=4.1.3 <4.5.4>=5.0.0 <5.3.5


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Regular Expression vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-FASTXMLPARSER-15324289
  • published20 Feb 2026
  • disclosed20 Feb 2026
  • creditochko

Introduced: 20 Feb 2026

NewCVE-2026-25896  (opens in a new tab)
CWE-185  (opens in a new tab)

How to fix?

Upgrade fast-xml-parser to version 4.5.4, 5.3.5 or higher.

Overview

fast-xml-parser is a Validate XML, Parse XML, Build XML without C/C++ based libraries

Affected versions of this package are vulnerable to Incorrect Regular Expression in the entity parsing RegEx in DOCTYPE declarations. An attacker can inject arbitrary values that override built-in XML entities by crafting entity names containing ., which is interpreted as a regex wildcard, allowing malicious content to be substituted in place of standard entities when the XML is parsed and subsequently rendered or used in sensitive contexts.

CVSS Base Scores

version 4.0
version 3.1