Impact
fast-xml-builder constructs XML from JSON. In version 1.1.5 a prior fix for CVE-2026-41650 replaced double dashes in comment content with a space pattern, but it failed to handle sequences of three consecutive dashes. This loophole allows an attacker to inject arbitrary XML or HTML by breaking out of an XML comment and inserting content, potentially enabling cross‑site scripting or XML injection.
Affected Systems
The affected product is NaturalIntelligence fast‑xml‑builder version 1.1.5. The vulnerability is fixed in version 1.1.6. No other versions are listed as affected.
Risk and Exploitability
The CVSS score is 6.1, indicating a medium severity. The EPSS score is not available, and the vulnerability is not listed in CISA KEV. An attacker can exploit the flaw by supplying JSON that contains an XML comment with triple dashes, a condition that does not require authentication. Successful exploitation can enable injection of XML or HTML content, which may lead to cross‑site scripting or improper data handling. The attack vector is inferred to be data input that goes through fast‑xml‑builder, likely from an untrusted source.
OpenCVE Enrichment
Github GHSA