Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33349: CWE-1284: Improper Validation of Specified Quantity in Input in NaturalIntelligence fast-xml-parser

0
Medium
VulnerabilityCVE-2026-33349cvecve-2026-33349cwe-1284
Published: Tue Mar 24 2026 (03/24/2026, 19:35:47 UTC)
Source: CVE Database V5
Vendor/Project: NaturalIntelligence
Product: fast-xml-parser

Description

CVE-2026-33349 is a medium severity vulnerability in NaturalIntelligence's fast-xml-parser versions 4. 0. 0-beta. 3 up to before 5. 5. 7. The issue arises from improper validation of maxEntityCount and maxEntitySize configuration limits due to JavaScript's treatment of zero as falsy. When these limits are set to zero to disallow entities or restrict entity size, the checks are bypassed, enabling unbounded entity expansion attacks. An attacker supplying crafted XML can trigger memory exhaustion and cause denial of service (DoS). No known exploits are reported in the wild, and the vulnerability requires network access but no authentication or user interaction.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 20:01:32 UTC

Technical Analysis

The vulnerability CVE-2026-33349 affects the fast-xml-parser library by NaturalIntelligence, specifically versions from 4.0.0-beta.3 up to but not including 5.5.7. The root cause lies in the DocTypeReader component, which processes XML input and enforces limits on entity expansion through maxEntityCount and maxEntitySize parameters. These parameters are intended to prevent excessive entity expansion that can lead to denial of service. However, the implementation uses JavaScript truthy/falsy evaluations to check these limits. When a developer sets either limit explicitly to zero (0), intending to disable entity expansion or restrict entity size to zero bytes, the falsy nature of zero causes the guard conditions to short-circuit and skip the limit enforcement entirely. This logical flaw allows an attacker who can supply XML input to the application to craft XML with unbounded entity expansion. Such XML payloads can cause the parser to consume excessive memory and CPU resources, leading to memory exhaustion and denial of service. The vulnerability does not impact confidentiality or integrity but severely affects availability. Exploitation requires the ability to send XML input to the vulnerable parser, which is typically over a network. No authentication or user interaction is needed, but the attack complexity is high due to the need to craft specific XML payloads. The issue was publicly disclosed on March 24, 2026, and patched in version 5.5.7 of fast-xml-parser. No known exploits have been reported in the wild to date.

Potential Impact

This vulnerability primarily impacts the availability of applications using the affected versions of fast-xml-parser. Attackers can cause denial of service by triggering unbounded XML entity expansion, leading to memory exhaustion and potential application crashes or service outages. Organizations relying on fast-xml-parser for XML processing in web services, APIs, or backend systems may experience service disruptions, affecting business continuity and user experience. The impact is particularly significant for internet-facing services that accept XML input from untrusted sources. While the vulnerability does not compromise data confidentiality or integrity, the resulting downtime can have cascading effects on dependent systems and services. Additionally, denial of service attacks can be used as a smokescreen for other malicious activities or to degrade the availability of critical infrastructure. Given the widespread use of JavaScript and Node.js in modern web applications, the scope of affected systems is broad, especially in environments where XML processing is integral. The medium CVSS score (5.9) reflects the moderate ease of exploitation combined with a significant impact on availability.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade fast-xml-parser to version 5.5.7 or later, where the issue is patched. If immediate upgrading is not feasible, developers should avoid setting maxEntityCount or maxEntitySize to zero, as this disables the protective limits. Instead, configure these parameters with positive integer values that effectively limit entity expansion to safe thresholds. Additionally, implement input validation and sanitization to reject XML inputs containing potentially malicious entity expansions before parsing. Employ runtime resource monitoring and limits (e.g., memory and CPU usage caps) on services processing XML to detect and mitigate resource exhaustion attacks. Consider using alternative XML parsers with robust entity expansion protections if fast-xml-parser cannot be updated promptly. Finally, restrict network access to XML processing endpoints to trusted sources where possible and monitor logs for unusual XML payloads indicative of entity expansion attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T22:15:11.814Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2ea08f4197a8e3b6b6441

Added to database: 3/24/2026, 7:46:16 PM

Last enriched: 3/24/2026, 8:01:32 PM

Last updated: 3/24/2026, 8:53:32 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses