Impact
In versions 4.1.3 through 5.3.5, the fast‑xml‑parser library processes XML without limiting entity expansion in a DOCTYPE declaration, allowing a crafted XML document to trigger repetitive entity expansions that consume CPU and memory and can cause the application to stall. This defect results in a denial of service and is categorized as a resource exhaustion flaw (CWE‑776).
Affected Systems
The vulnerability affects NaturalIntelligence’s fast‑xml‑parser library in releases 4.1.3 to 5.3.5. A fix was released in version 5.3.6, after which the unlimited expansion behavior was removed.
Risk and Exploitability
With a CVSS score of 7.5 the vulnerability is of high severity, yet its EPSS score is below 1% and it is not listed in CISA’s KEV catalog, indicating a low probability of exploitation in the wild. An attacker would need to supply XML input to a vulnerable application or API that parses XML, and the attack would consume system resources to render the service unavailable.
OpenCVE Enrichment
Github GHSA