Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29074: CWE-776: Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') in svg svgo

0
High
VulnerabilityCVE-2026-29074cvecve-2026-29074cwe-776
Published: Fri Mar 06 2026 (03/06/2026, 07:23:05 UTC)
Source: CVE Database V5
Vendor/Project: svg
Product: svgo

Description

CVE-2026-29074 is a high-severity vulnerability in SVGO, a popular Node. js library used for optimizing SVG files. The flaw arises from improper restriction of recursive XML entity references in DTDs, allowing crafted SVG files with malicious entity expansions to cause denial of service by exhausting memory resources. A small specially crafted SVG file (811 bytes) can stall the application or crash the Node. js process due to JavaScript heap out of memory errors. This affects SVGO versions from 2. 1. 0 up to but not including 2. 8. 1, 3.

AI-Powered Analysis

AILast updated: 03/06/2026, 07:45:40 UTC

Technical Analysis

The vulnerability CVE-2026-29074 in SVGO (SVG Optimizer) stems from CWE-776: Improper Restriction of Recursive Entity References in XML DTDs. SVGO versions 2.1.0 through 2.8.0, 3.0.0 through 3.3.2, and 4.0.0 accept SVG files containing XML with custom entity definitions without adequate safeguards against recursive or excessive entity expansion. This flaw enables an attacker to craft a malicious SVG file embedding recursive XML entities that cause exponential entity expansion during parsing. When SVGO processes such a file, it can lead to excessive memory consumption, resulting in the Node.js process crashing due to JavaScript heap out of memory errors or the application becoming unresponsive. The issue is a denial-of-service (DoS) vulnerability impacting availability but does not compromise confidentiality or integrity. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it particularly dangerous in automated environments where untrusted SVG files are processed. The vulnerability was assigned a CVSS v3.1 base score of 7.5 (high severity), reflecting its network attack vector, no required privileges or user interaction, and high impact on availability. The issue has been addressed in SVGO versions 2.8.1, 3.3.3, and 4.0.1 by implementing proper restrictions on entity expansion to prevent recursive or excessive resource consumption during XML parsing.

Potential Impact

Organizations using SVGO for automated SVG optimization, especially in web development, CI/CD pipelines, or content management systems, are at risk of denial-of-service attacks. An attacker can supply a malicious SVG file that triggers excessive memory consumption, causing the Node.js process to crash or stall. This can lead to service outages, degraded performance, or disruption of automated workflows that rely on SVG processing. Since SVGO is widely used in frontend build processes and graphic asset pipelines, the impact can cascade to web applications, developer productivity, and continuous integration systems. The vulnerability does not expose sensitive data or allow code execution, but the availability impact can be severe, especially in high-throughput or public-facing environments. Additionally, the ease of exploitation without authentication increases the risk of automated attacks. Organizations that integrate SVGO into backend services or accept user-uploaded SVG files without validation are particularly vulnerable.

Mitigation Recommendations

1. Upgrade SVGO to the patched versions 2.8.1, 3.3.3, or 4.0.1 immediately to ensure the vulnerability is fixed. 2. Implement input validation and sanitization to reject SVG files containing DTDs or custom XML entities before processing. 3. Use XML parsers or libraries that enforce strict limits on entity expansion and recursion to prevent resource exhaustion. 4. Employ runtime resource limits (memory and CPU) on processes handling SVG optimization to contain potential DoS impacts. 5. If upgrading is not immediately possible, consider disabling SVG optimization or processing untrusted SVG files in isolated environments or sandboxes. 6. Monitor application logs and system metrics for signs of memory exhaustion or crashes related to SVG processing. 7. Educate developers and DevOps teams about the risks of processing untrusted XML content and the importance of patching dependencies promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-03T20:51:43.482Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69aa82b7c48b3f10ff296e5d

Added to database: 3/6/2026, 7:31:03 AM

Last enriched: 3/6/2026, 7:45:40 AM

Last updated: 3/6/2026, 3:08:55 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses