fix: upgrade fast-xml-parser to 5.3.5, 4.5.4 (CVE-2026-25896)#1111
fix: upgrade fast-xml-parser to 5.3.5, 4.5.4 (CVE-2026-25896)#1111orbisai0security wants to merge 2 commits intof:mainfrom
Conversation
fast-xml-parser: fast-xml-parser: Cross-Site Scripting (XSS) due to improper DOCTYPE entity handling Resolves CVE-2026-25896
|
Important Review skippedReview was skipped due to path filters ⛔ Files ignored due to path filters (1)
CodeRabbit blocks several paths by default. You can override this behavior by explicitly including those paths in the path filters. For example, including ⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Run ID: You can disable this status message by setting the Use the checkbox below for a quick retry:
📝 WalkthroughWalkthroughThe pull request adds the Changes
Estimated code review effort🎯 1 (Trivial) | ⏱️ ~2 minutes Poem
🚥 Pre-merge checks | ✅ 3✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Actionable comments posted: 1
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.
Inline comments:
In `@package.json`:
- Line 67: The package-lock.json still pins fast-xml-parser to the vulnerable
5.2.5 despite package.json being updated to "^5.3.5"; regenerate the lockfile by
running npm install (or npm ci after updating package.json) to update
package-lock.json so fast-xml-parser resolves to 5.3.5 or later, then commit the
updated package-lock.json; check the package-lock.json entry for
"fast-xml-parser" to confirm the resolved version is >=5.3.5.
🪄 Autofix (Beta)
Fix all unresolved CodeRabbit comments on this PR:
- Push a commit to this branch (recommended)
- Create a new PR with the fixes
ℹ️ Review info
⚙️ Run configuration
Configuration used: Organization UI
Review profile: CHILL
Plan: Pro
Run ID: 7f4d2b21-2677-4e8f-9364-9095a7571952
⛔ Files ignored due to path filters (1)
package-lock.jsonis excluded by!**/package-lock.json
📒 Files selected for processing (1)
package.json
|
F |
|
(؟) |
|
@orbisai0security can you address the code review changes? |
|
✅ Changes Applied I've updated the code based on your feedback: The code review correctly identified that The fix updates:
This ensures no copy of the vulnerable Files modified:
The changes have been pushed to this PR branch. Please review! |
Summary
Upgrade fast-xml-parser from 5.2.5 to 5.3.5, 4.5.4 to fix CVE-2026-25896.
Vulnerability
CVE-2026-25896package-lock.jsonDescription: fast-xml-parser: fast-xml-parser: Cross-Site Scripting (XSS) due to improper DOCTYPE entity handling
Changes
package.jsonpackage-lock.jsonVerification
Automated security fix by OrbisAI Security
Summary by CodeRabbit