<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-44665 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-44665/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-44665/feed.xml" rel="self" type="application/rss+xml"/><item><title>fast-xml-builder Vulnerability Allows Attribute Injection</title><link>https://feed.craftedsignal.io/briefs/2024-01-fast-xml-builder-injection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-fast-xml-builder-injection/</guid><description>The fast-xml-builder library allows attribute injection when handling attribute values containing quotes, leading to potential execution of arbitrary code.</description><content:encoded><![CDATA[<p>The fast-xml-builder npm package, version 1.1.6 and earlier, is susceptible to an attribute injection vulnerability (CVE-2026-44665). When processing XML/HTML with attribute values containing quotes, and the <code>processEntities</code> flag is disabled, the library incorrectly parses the input. This parsing failure leads to the breaking of the attribute value into multiple attributes, which can allow an attacker to inject arbitrary attributes, including those containing malicious code, into the resulting XML/HTML. This issue can occur in any application using fast-xml-builder to generate XML from user-controlled input, potentially leading to cross-site scripting (XSS) or other injection-based attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts malicious input data containing quoted attribute values intended for XML/HTML generation.</li>
<li>The attacker injects the crafted data into an application using fast-xml-builder.</li>
<li>The application utilizes fast-xml-builder to process the data and generate XML/HTML output, with the <code>processEntities</code> flag disabled.</li>
<li>Due to the vulnerability, fast-xml-builder incorrectly parses the attribute value, splitting it into multiple attributes.</li>
<li>The injected malicious attributes are incorporated into the resulting XML/HTML structure.</li>
<li>The application sends the malformed XML/HTML response to a user.</li>
<li>The user&rsquo;s browser renders the page, executing the injected malicious code (e.g., JavaScript).</li>
<li>The attacker achieves cross-site scripting (XSS) or other injection-based attacks, leading to potential data theft or compromise of the user&rsquo;s session.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to inject arbitrary HTML attributes into XML documents. This can lead to cross-site scripting (XSS) attacks if the generated XML is used in a web application. Given the widespread use of fast-xml-builder in Node.js projects, a large number of applications could be vulnerable. The impact ranges from defacement and information theft to complete compromise of user accounts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of <code>fast-xml-builder</code> if one becomes available or use a different XML builder library.</li>
<li>As a temporary workaround, ensure the <code>processEntities</code> flag is set to <code>true</code> when using <code>fast-xml-builder</code>, as mentioned in the advisory.</li>
<li>Deploy the Sigma rule below to identify potential exploitation attempts by detecting suspicious attribute values being passed to the vulnerable library.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xml</category><category>injection</category><category>xss</category><category>cve-2026-44665</category></item></channel></rss>