CVE-2026-41650 PUBLISHED

fast-xml-parser XMLBuilder: XML Comment and CDATA Injection via Unescaped Delimiters

Assigner: GitHub_M
Reserved: 21.04.2026 Published: 07.05.2026 Updated: 07.05.2026

fast-xml-parser allows users to process XML from JS object without C/C++ based libraries or callbacks. Prior to version 5.7.0, XMLBuilder does not escape the "-->" sequence in comment content or the "]]>" sequence in CDATA sections when building XML from JavaScript objects. This allows XML injection when user-controlled data flows into comments or CDATA elements, leading to XSS, SOAP injection, or data manipulation. This issue has been patched in version 5.7.0.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS Score: 6.1

Product Status

Vendor NaturalIntelligence
Product fast-xml-parser
Versions
  • Version < 5.7.0 is affected

References

Problem Types

  • CWE-91: XML Injection (aka Blind XPath Injection) CWE