CVE-2026-44664 PUBLISHED

fast-xml-builder: Comment Value bypass regex

Assigner: GitHub_M
Reserved: 07.05.2026 Published: 13.05.2026 Updated: 13.05.2026

fast-xml-builder builds XML from JSON. In 1.1.5, the fix for CVE-2026-41650 in fast-xml-parser sanitizes -- sequences in XML comment content using .replace(/--/g, '- -'). This skip the values containing three consecutive dashes (e.g., --->...), allowing an attacker to break out of an XML comment and inject arbitrary XML/HTML content. This vulnerability is fixed in 1.1.6.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS Score: 6.1

Product Status

Vendor NaturalIntelligence
Product fast-xml-builder
Versions
  • Version 1.1.5 is affected

References

Problem Types

  • CWE-91: XML Injection (aka Blind XPath Injection) CWE