CVE-2026-27942
ADVISORY - githubSummary
Impact
Application crashes with stack overflow when user use XML builder with prserveOrder:true for following or similar input
[{
'foo': [
{ 'bar': [{ '@_V': 'baz' }] }
]
}]
Cause: arrToStr was not validating if the input is an array or a string and treating all non-array values as text content.
What kind of vulnerability is it? Who is impacted?
Patches
Yes in 5.3.8
Workarounds
Use XML builder with preserveOrder:false or check the input data before passing to builder.
References
Common Weakness Enumeration (CWE)
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
NIST
3.9
CVSS SCORE
2.7lowGitHub
-
CVSS SCORE
2.7lowDebian
-
Ubuntu
3.9
CVSS SCORE
7.5mediumRed Hat
3.9
CVSS SCORE
7.5mediumChainguard
CGA-83fg-7mmw-c32r
-
minimos
MINI-59p8-fjv4-pr8g
-
minimos
MINI-99c3-c23w-cgx8
-
minimos
MINI-cf2r-m833-4r76
-
minimos
MINI-cx7c-xh4j-mf56
-
minimos
MINI-mxwx-jm76-j46x
-
minimos
MINI-qf92-hc7x-fvjh
-
minimos
MINI-v36x-x8gx-26j3
-
minimos
MINI-v763-v69w-jvrm
-