UBUNTU-CVE-2026-33036

Source
https://ubuntu.com/security/CVE-2026-33036
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33036.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2026-33036
Upstream
Published
2026-03-20T06:16:00Z
Modified
2026-04-02T17:31:26Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

fast-xml-parser allows users to process XML from JS object without C/C++ based libraries or callbacks. Versions 4.0.0-beta.3 through 5.5.5 contain a bypass vulnerability where numeric character references (&#NNN;, &#xHH;) and standard XML entities completely evade the entity expansion limits (e.g., maxTotalExpansions, maxExpandedLength) added to fix CVE-2026-26278, enabling XML entity expansion Denial of Service. The root cause is that replaceEntitiesValue() in OrderedObjParser.js only enforces expansion counting on DOCTYPE-defined entities while the lastEntities loop handling numeric/standard entities performs no counting at all. An attacker supplying 1M numeric entity references like A can force ~147MB of memory allocation and heavy CPU usage, potentially crashing the process—even when developers have configured strict limits. This issue has been fixed in version 5.5.6.

References

Affected packages

Ubuntu:24.04:LTS / node-webfont

Package

Name
node-webfont
Purl
pkg:deb/ubuntu/node-webfont@11.4.0+dfsg2+~cs35.7.26-7ubuntu1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

11.*
11.4.0+dfsg2+~cs35.7.26-7ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "node-webfont",
            "binary_version": "11.4.0+dfsg2+~cs35.7.26-7ubuntu1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33036.json"

Ubuntu:25.10 / node-webfont

Package

Name
node-webfont
Purl
pkg:deb/ubuntu/node-webfont@11.4.0+dfsg2+~cs35.7.26-13ubuntu2?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

11.*
11.4.0+dfsg2+~cs35.7.26-10
11.4.0+dfsg2+~cs35.7.26-13ubuntu2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "node-webfont",
            "binary_version": "11.4.0+dfsg2+~cs35.7.26-13ubuntu2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33036.json"