CVE-2026-27942

ADVISORY - github

Summary

Impact

Application crashes with stack overflow when user use XML builder with prserveOrder:true for following or similar input

[{
    'foo': [
        { 'bar': [{ '@_V': 'baz' }] }
    ]
}]

Cause: arrToStr was not validating if the input is an array or a string and treating all non-array values as text content. What kind of vulnerability is it? Who is impacted?

Patches

Yes in 5.3.8

Workarounds

Use XML builder with preserveOrder:false or check the input data before passing to builder.

References

Are there any links users can visit to find out more?

EPSS Score: 0.0005 (0.152)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

ADVISORY - github

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

ADVISORY - redhat

Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in