CVE-2026-33349: CWE-1284: Improper Validation of Specified Quantity in Input in NaturalIntelligence fast-xml-parser
CVE-2026-33349 is a medium severity vulnerability in NaturalIntelligence's fast-xml-parser versions 4. 0. 0-beta. 3 up to before 5. 5. 7. The issue arises from improper validation of maxEntityCount and maxEntitySize configuration limits due to JavaScript's treatment of zero as falsy. When these limits are set to zero to disallow entities or restrict entity size, the checks are bypassed, enabling unbounded entity expansion attacks. An attacker supplying crafted XML can trigger memory exhaustion and cause denial of service (DoS). No known exploits are reported in the wild, and the vulnerability requires network access but no authentication or user interaction.
AI Analysis
Technical Summary
The vulnerability CVE-2026-33349 affects the fast-xml-parser library by NaturalIntelligence, specifically versions from 4.0.0-beta.3 up to but not including 5.5.7. The root cause lies in the DocTypeReader component, which processes XML input and enforces limits on entity expansion through maxEntityCount and maxEntitySize parameters. These parameters are intended to prevent excessive entity expansion that can lead to denial of service. However, the implementation uses JavaScript truthy/falsy evaluations to check these limits. When a developer sets either limit explicitly to zero (0), intending to disable entity expansion or restrict entity size to zero bytes, the falsy nature of zero causes the guard conditions to short-circuit and skip the limit enforcement entirely. This logical flaw allows an attacker who can supply XML input to the application to craft XML with unbounded entity expansion. Such XML payloads can cause the parser to consume excessive memory and CPU resources, leading to memory exhaustion and denial of service. The vulnerability does not impact confidentiality or integrity but severely affects availability. Exploitation requires the ability to send XML input to the vulnerable parser, which is typically over a network. No authentication or user interaction is needed, but the attack complexity is high due to the need to craft specific XML payloads. The issue was publicly disclosed on March 24, 2026, and patched in version 5.5.7 of fast-xml-parser. No known exploits have been reported in the wild to date.
Potential Impact
This vulnerability primarily impacts the availability of applications using the affected versions of fast-xml-parser. Attackers can cause denial of service by triggering unbounded XML entity expansion, leading to memory exhaustion and potential application crashes or service outages. Organizations relying on fast-xml-parser for XML processing in web services, APIs, or backend systems may experience service disruptions, affecting business continuity and user experience. The impact is particularly significant for internet-facing services that accept XML input from untrusted sources. While the vulnerability does not compromise data confidentiality or integrity, the resulting downtime can have cascading effects on dependent systems and services. Additionally, denial of service attacks can be used as a smokescreen for other malicious activities or to degrade the availability of critical infrastructure. Given the widespread use of JavaScript and Node.js in modern web applications, the scope of affected systems is broad, especially in environments where XML processing is integral. The medium CVSS score (5.9) reflects the moderate ease of exploitation combined with a significant impact on availability.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade fast-xml-parser to version 5.5.7 or later, where the issue is patched. If immediate upgrading is not feasible, developers should avoid setting maxEntityCount or maxEntitySize to zero, as this disables the protective limits. Instead, configure these parameters with positive integer values that effectively limit entity expansion to safe thresholds. Additionally, implement input validation and sanitization to reject XML inputs containing potentially malicious entity expansions before parsing. Employ runtime resource monitoring and limits (e.g., memory and CPU usage caps) on services processing XML to detect and mitigate resource exhaustion attacks. Consider using alternative XML parsers with robust entity expansion protections if fast-xml-parser cannot be updated promptly. Finally, restrict network access to XML processing endpoints to trusted sources where possible and monitor logs for unusual XML payloads indicative of entity expansion attacks.
Affected Countries
United States, Germany, United Kingdom, India, China, Japan, South Korea, France, Canada, Australia
CVE-2026-33349: CWE-1284: Improper Validation of Specified Quantity in Input in NaturalIntelligence fast-xml-parser
Description
CVE-2026-33349 is a medium severity vulnerability in NaturalIntelligence's fast-xml-parser versions 4. 0. 0-beta. 3 up to before 5. 5. 7. The issue arises from improper validation of maxEntityCount and maxEntitySize configuration limits due to JavaScript's treatment of zero as falsy. When these limits are set to zero to disallow entities or restrict entity size, the checks are bypassed, enabling unbounded entity expansion attacks. An attacker supplying crafted XML can trigger memory exhaustion and cause denial of service (DoS). No known exploits are reported in the wild, and the vulnerability requires network access but no authentication or user interaction.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability CVE-2026-33349 affects the fast-xml-parser library by NaturalIntelligence, specifically versions from 4.0.0-beta.3 up to but not including 5.5.7. The root cause lies in the DocTypeReader component, which processes XML input and enforces limits on entity expansion through maxEntityCount and maxEntitySize parameters. These parameters are intended to prevent excessive entity expansion that can lead to denial of service. However, the implementation uses JavaScript truthy/falsy evaluations to check these limits. When a developer sets either limit explicitly to zero (0), intending to disable entity expansion or restrict entity size to zero bytes, the falsy nature of zero causes the guard conditions to short-circuit and skip the limit enforcement entirely. This logical flaw allows an attacker who can supply XML input to the application to craft XML with unbounded entity expansion. Such XML payloads can cause the parser to consume excessive memory and CPU resources, leading to memory exhaustion and denial of service. The vulnerability does not impact confidentiality or integrity but severely affects availability. Exploitation requires the ability to send XML input to the vulnerable parser, which is typically over a network. No authentication or user interaction is needed, but the attack complexity is high due to the need to craft specific XML payloads. The issue was publicly disclosed on March 24, 2026, and patched in version 5.5.7 of fast-xml-parser. No known exploits have been reported in the wild to date.
Potential Impact
This vulnerability primarily impacts the availability of applications using the affected versions of fast-xml-parser. Attackers can cause denial of service by triggering unbounded XML entity expansion, leading to memory exhaustion and potential application crashes or service outages. Organizations relying on fast-xml-parser for XML processing in web services, APIs, or backend systems may experience service disruptions, affecting business continuity and user experience. The impact is particularly significant for internet-facing services that accept XML input from untrusted sources. While the vulnerability does not compromise data confidentiality or integrity, the resulting downtime can have cascading effects on dependent systems and services. Additionally, denial of service attacks can be used as a smokescreen for other malicious activities or to degrade the availability of critical infrastructure. Given the widespread use of JavaScript and Node.js in modern web applications, the scope of affected systems is broad, especially in environments where XML processing is integral. The medium CVSS score (5.9) reflects the moderate ease of exploitation combined with a significant impact on availability.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade fast-xml-parser to version 5.5.7 or later, where the issue is patched. If immediate upgrading is not feasible, developers should avoid setting maxEntityCount or maxEntitySize to zero, as this disables the protective limits. Instead, configure these parameters with positive integer values that effectively limit entity expansion to safe thresholds. Additionally, implement input validation and sanitization to reject XML inputs containing potentially malicious entity expansions before parsing. Employ runtime resource monitoring and limits (e.g., memory and CPU usage caps) on services processing XML to detect and mitigate resource exhaustion attacks. Consider using alternative XML parsers with robust entity expansion protections if fast-xml-parser cannot be updated promptly. Finally, restrict network access to XML processing endpoints to trusted sources where possible and monitor logs for unusual XML payloads indicative of entity expansion attacks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-18T22:15:11.814Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c2ea08f4197a8e3b6b6441
Added to database: 3/24/2026, 7:46:16 PM
Last enriched: 3/24/2026, 8:01:32 PM
Last updated: 3/24/2026, 8:53:32 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.