CVE-2024-41818
High
|7.5Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to cause a denial of service by sending specially crafted XML input to the fast-xml-parser, which can lead to the application becoming unresponsive. It specifically affects versions prior to 4.4.1 and requires the application to use the vulnerable currency.js component to be exploited.
Technical Description
fast-xml-parser is an open source, pure javascript xml parser. a ReDOS exists on currency.js. This vulnerability is fixed in 4.4.1.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactNone
Availability ImpactHigh
ScopeUnchanged
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$2,053($1K-$5K)
Vendor Response
Grade FPatched in 587 days
Quick Information
Published
Jul 29, 2024
over 1 year ago
Last Modified
Mar 9, 2026
29 days ago
Vendor
naturalintelligence
Product
fast-xml-parser