libxmljs is vulnerable to Type Confusion
93
Critical Risk
Affected versions of this package contain a type confusion vulnerability when parsing specially crafted XML and invoking the namespaces() function on a grand-child node that references an entity. The underlying _wrap__xmlNode_nsDef_get() call may incorrectly interpret memory structures, leading to memory corruption. An attacker could provide a malicious XML payload that triggers this condition during parsing, potentially causing denial of service or remote code execution if memory corruption is exploited. Notably, this issue has remained open for years and the package appears to be unmaintained or no longer actively updated, which increases the risk of continued exposure.
You are affected if you are using this package.
libxmljs is vulnerable to Type Confusion in all versions.
Remove any libxmljs package from your application. Please take a look at libxml2-wasm instead.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant