CVE-2026-27942
ADVISORY - githubSummary
Impact
Application crashes with stack overflow when user use XML builder with prserveOrder:true for following or similar input
[{
'foo': [
{ 'bar': [{ '@_V': 'baz' }] }
]
}]
Cause: arrToStr was not validating if the input is an array or a string and treating all non-array values as text content.
What kind of vulnerability is it? Who is impacted?
Patches
Yes in 5.3.8
Workarounds
Use XML builder with preserveOrder:false or check the input data before passing to builder.
References
EPSS Score: 0.0005 (0.152)
Common Weakness Enumeration (CWE)
ADVISORY - nist
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
ADVISORY - github
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
ADVISORY - redhat
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
Sign in to Docker Scout
See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.
Sign in