Skip to content

Build(deps): Bump fast-xml-parser from 5.5.7 to 5.7.1#285

Open
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/npm_and_yarn/fast-xml-parser-5.7.1
Open

Build(deps): Bump fast-xml-parser from 5.5.7 to 5.7.1#285
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/npm_and_yarn/fast-xml-parser-5.7.1

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot Bot commented on behalf of github Apr 23, 2026

Bumps fast-xml-parser from 5.5.7 to 5.7.1.

Release notes

Sourced from fast-xml-parser's releases.

upgrade @​nodable/entities and FXB

  • Use @nodable/entities v2.1.0
    • breaking changes
      • single entity scan. You're not allowed to use entity value to form another entity name.
      • you cant add numeric external entity
      • entity error message when expantion limit is crossed might change
    • typings are updated for new options related to process entity
    • please follow documentation of @nodable/entities for more detail.
    • performance
      • if processEntities is false, then there should not be impact on performance.
      • if processEntities is true, but you dont pass entity decoder separately then performance may degrade by approx 8-10%
      • if processEntities is true, and you pass entity decoder separately
        • if no entity then performance should be same as before
        • if there are entities then performance should be increased from past versions
    • ignoreAttributes is not required to be set to set xml version for NCR entity value
  • update 'fast-xml-builder' to sanitize malicious CDATA and comment's content

use @​nodable/entities to replace entities

  • No API change
  • No change in performance for basic usage
  • No typing change
  • No config change
  • new dependency
  • breaking: error messages for entities might have been changed.

Full Changelog: NaturalIntelligence/fast-xml-parser@v5.5.12...v5.6.0

performance improvment, increase entity expansion default limit

  • increase default entity explansion limit as many projects demand for that
maxEntitySize: 10000,
maxExpansionDepth: 10000,
maxTotalExpansions: Infinity,
maxExpandedLength: 100000,
maxEntityCount: 1000,
  • performance improvement
    • reduce calls to toString
    • early return when entities are not present
    • prepare rawAttrsForMatcher only if user sets jPath: false

Full Changelog: NaturalIntelligence/fast-xml-parser@v5.5.9...v5.5.10

fix typins and matcher instance in callbacks

combine typings file to avoid configuration changes pass readonly instance of matcher to the call backs to avoid accidental push/pop call

Changelog

Sourced from fast-xml-parser's changelog.

Note: If you find missing information about particular minor version, that version must have been changed without any functional change in this library.

Note: Due to some last quick changes on v4, detail of v4.5.3 & v4.5.4 are not updated here. v4.5.4x is the last tag of v4 in github repository. I'm extremely sorry for the confusion

5.7.1 / 2026-04-20

  • fix #705: attributesGroupName working with preserveOrder
  • fix #817: stackoverflow when tag expression is very long

5.7.0 / 2026-04-17

  • Use @nodable/entities v2.1.0
    • breaking changes
      • single entity scan. You're not allowed to user entity value to form another entity name.
      • you cant add numeric external entity
      • entity error message when expantion limit is crossed might change
    • typings are updated for new options related to process entity
    • please follow documentation of @nodable/entities for more detail.
    • performance
      • if processEntities is false, then there should not be impact on performance.
      • if processEntities is true, but you dont pass entity decoder separately then performance may degrade by approx 8-10%
      • if processEntities is true, and you pass entity decoder separately
        • if no entity then performance should be same as before
        • if there are entities then performance should be increased from past versions
    • ignoreAttributes is not required to be set to set xml version for NCR entity value
  • update 'fast-xml-builder' to sanitize malicious CDATA and comment's content

5.6.0 / 2026-04-15

  • fix: entity replacement for numeric entities
  • use @​nodable/entities to replace entities
    • this may change some error messages related to entities expansion limit or inavlid use
    • post check would be exposed in future version

5.5.12 / 2026-04-13

  • Performance Improvement: update path-expression-matcher
    • use proxy pattern than Proxy class

5.5.11 / 2026-04-08

  • Performance Improvement
    • integrate ExpressionSet for stopNodes

5.5.10 / 2026-04-03

  • increase default entity explansion limit as many projects demand for that
  • performance improvement
    • reduce calls to toString
    • early return when entities are not present
    • prepare rawAttrsForMatcher only if user sets jPath: false

5.5.9 / 2026-03-23

  • combine typing files

... (truncated)

Commits
  • 0f08303 fix typo
  • f529642 update to release v5.7.0
  • 52a8583 Revert "improve performance of attributes reading"
  • 8d187f9 update builder
  • e174168 improve performance of attributes reading
  • 79a8dde update docs
  • f5cd5a5 set xml version to decoder even if attributes are ignored
  • f44b923 remove unwanted tests
  • 869ec8b Use @​nodable/entities v2.1.0
  • 7cb49e5 update release detail
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [fast-xml-parser](https://github.com/NaturalIntelligence/fast-xml-parser) from 5.5.7 to 5.7.1.
- [Release notes](https://github.com/NaturalIntelligence/fast-xml-parser/releases)
- [Changelog](https://github.com/NaturalIntelligence/fast-xml-parser/blob/master/CHANGELOG.md)
- [Commits](NaturalIntelligence/fast-xml-parser@v5.5.7...v5.7.1)

---
updated-dependencies:
- dependency-name: fast-xml-parser
  dependency-version: 5.7.1
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot Bot added dependabot Dependabot issues and PRs npm Node.js issues and PRs labels Apr 23, 2026
@dependabot dependabot Bot requested a review from ncalteen as a code owner April 23, 2026 06:19
@dependabot dependabot Bot added dependabot Dependabot issues and PRs npm Node.js issues and PRs labels Apr 23, 2026
@github-actions
Copy link
Copy Markdown

MegaLinter analysis: Error

Descriptor Linter Files Fixed Errors Warnings Elapsed time
✅ ACTION actionlint 5 0 0 0.32s
✅ JAVASCRIPT prettier 19 0 0 5.75s
✅ JSON npm-package-json-lint yes no no 0.94s
✅ JSON prettier 29 0 0 1.63s
✅ MARKDOWN markdownlint 10 0 0 0.94s
✅ REPOSITORY checkov yes no no 29.54s
✅ REPOSITORY gitleaks yes no no 1.69s
✅ REPOSITORY git_diff yes no no 0.02s
❌ REPOSITORY grype yes 5 no 60.98s
✅ REPOSITORY secretlint yes no no 1.18s
✅ REPOSITORY syft yes no no 4.46s
❌ REPOSITORY trivy yes 1 no 17.51s
✅ REPOSITORY trivy-sbom yes no no 4.3s
✅ REPOSITORY trufflehog yes no no 46.55s
✅ TYPESCRIPT prettier 108 0 0 3.84s
✅ YAML prettier 25 0 0 1.1s
✅ YAML yamllint 25 0 0 1.04s

Detailed Issues

❌ REPOSITORY / grype - 5 errors
[0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal) from=syft
NAME             INSTALLED  FIXED IN  TYPE  VULNERABILITY        SEVERITY  EPSS           RISK   
lodash           4.17.23    4.18.0    npm   GHSA-r5fr-rjxr-66jc  High      < 0.1% (11th)  < 0.1  
yaml             2.8.2      2.8.3     npm   GHSA-48c2-rrv3-qjmp  Medium    < 0.1% (16th)  < 0.1  
lodash           4.17.23    4.18.0    npm   GHSA-f23m-r3pf-42rh  Medium    < 0.1% (6th)   < 0.1  
brace-expansion  1.1.12     1.1.13    npm   GHSA-f886-m6hf-6m8v  Medium    < 0.1% (5th)   < 0.1  
brace-expansion  2.0.2      2.0.3     npm   GHSA-f886-m6hf-6m8v  Medium    < 0.1% (5th)   < 0.1
[0060] ERROR discovered vulnerabilities at or above the severity threshold
❌ REPOSITORY / trivy - 1 error
2026-04-23T06:21:52Z	INFO	[vulndb] Need to update DB
2026-04-23T06:21:52Z	INFO	[vulndb] Downloading vulnerability DB...
2026-04-23T06:21:52Z	INFO	[vulndb] Downloading artifact...	repo="mirror.gcr.io/aquasec/trivy-db:2"
671.17 KiB / 91.09 MiB [>____________________________________________________________] 0.72% ? p/s ?4.53 MiB / 91.09 MiB [--->___________________________________________________________] 4.97% ? p/s ?20.36 MiB / 91.09 MiB [------------->_______________________________________________] 22.35% ? p/s ?39.51 MiB / 91.09 MiB [-------------------->___________________________] 43.37% 64.57 MiB p/s ETA 0s58.43 MiB / 91.09 MiB [------------------------------>_________________] 64.15% 64.57 MiB p/s ETA 0s77.90 MiB / 91.09 MiB [----------------------------------------->______] 85.53% 64.57 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 65.96 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 65.96 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 65.96 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 61.71 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 61.71 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 61.71 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 57.72 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 57.72 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 57.72 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 54.00 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 54.00 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 54.00 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 50.52 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 50.52 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 50.52 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 47.26 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 47.26 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 47.26 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 44.21 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 44.21 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 44.21 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [---------------------------------------------->] 100.00% 41.36 MiB p/s ETA 0s91.09 MiB / 91.09 MiB [-------------------------------------------------] 100.00% 16.76 MiB p/s 5.6s2026-04-23T06:21:59Z	INFO	[vulndb] Artifact successfully downloaded	repo="mirror.gcr.io/aquasec/trivy-db:2"
2026-04-23T06:21:59Z	INFO	[vuln] Vulnerability scanning is enabled
2026-04-23T06:21:59Z	INFO	[misconfig] Misconfiguration scanning is enabled
2026-04-23T06:21:59Z	INFO	[checks-client] Need to update the checks bundle
2026-04-23T06:21:59Z	INFO	[checks-client] Downloading the checks bundle...
234.65 KiB / 234.65 KiB [--------------------------------------------------------->] 100.00% ? p/s ?234.65 KiB / 234.65 KiB [-----------------------------------------------] 100.00% 2.14 MiB p/s 300ms2026-04-23T06:22:08Z	INFO	Suppressing dependencies for development and testing. To display them, try the '--include-dev-deps' flag.
2026-04-23T06:22:08Z	INFO	Number of language-specific files	num=1
2026-04-23T06:22:08Z	INFO	[npm] Detecting vulnerabilities...
2026-04-23T06:22:08Z	INFO	Detected config files	num=0

Report Summary

┌───────────────────┬──────┬─────────────────┬───────────────────┐
│      Target       │ Type │ Vulnerabilities │ Misconfigurations │
├───────────────────┼──────┼─────────────────┼───────────────────┤
│ package-lock.json │ npm  │        5        │         -         │
└───────────────────┴──────┴─────────────────┴───────────────────┘
Legend:
- '-': Not scanned
- '0': Clean (no security findings detected)


For OSS Maintainers: VEX Notice
--------------------------------
If you're an OSS maintainer and Trivy has detected vulnerabilities in your project that you believe are not actually exploitable, consider issuing a VEX (Vulnerability Exploitability eXchange) statement.
VEX allows you to communicate the actual status of vulnerabilities in your project, improving security transparency and reducing false positives for your users.
Learn more and start using VEX: https://trivy.dev/docs/v0.69/guide/supply-chain/vex/repo#publishing-vex-documents

To disable this notice, set the TRIVY_DISABLE_VEX_NOTICE environment variable.


package-lock.json (npm)
=======================
Total: 5 (UNKNOWN: 0, LOW: 0, MEDIUM: 4, HIGH: 1, CRITICAL: 0)

┌─────────────────┬────────────────┬──────────┬────────┬───────────────────┬─────────────────────────────┬──────────────────────────────────────────────────────────────┐
│     Library     │ Vulnerability  │ Severity │ Status │ Installed Version │        Fixed Version        │                            Title                             │
├─────────────────┼────────────────┼──────────┼────────┼───────────────────┼─────────────────────────────┼──────────────────────────────────────────────────────────────┤
│ brace-expansion │ CVE-2026-33750 │ MEDIUM   │ fixed  │ 1.1.12            │ 5.0.5, 3.0.2, 2.0.3, 1.1.13 │ brace-expansion: brace-expansion: Denial of Service via zero │
│                 │                │          │        │                   │                             │ step value in brace pattern...                               │
│                 │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-33750                   │
│                 │                │          │        ├───────────────────┤                             │                                                              │
│                 │                │          │        │ 2.0.2             │                             │                                                              │
│                 │                │          │        │                   │                             │                                                              │
│                 │                │          │        │                   │                             │                                                              │
├─────────────────┼────────────────┼──────────┤        ├───────────────────┼─────────────────────────────┼──────────────────────────────────────────────────────────────┤
│ lodash          │ CVE-2026-4800  │ HIGH     │        │ 4.17.23           │ 4.18.0                      │ lodash: lodash: Arbitrary code execution via untrusted input │
│                 │                │          │        │                   │                             │ in template imports                                          │
│                 │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-4800                    │
│                 ├────────────────┼──────────┤        │                   │                             ├──────────────────────────────────────────────────────────────┤
│                 │ CVE-2026-2950  │ MEDIUM   │        │                   │                             │ lodash: Lodash: Prototype pollution allows deletion of       │
│                 │                │          │        │                   │                             │ built-in prototype properties via array...                   │
│                 │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-2950                    │
├─────────────────┼────────────────┤          │        ├───────────────────┼─────────────────────────────┼──────────────────────────────────────────────────────────────┤
│ yaml            │ CVE-2026-33532 │          │        │ 2.8.2             │ 2.8.3, 1.10.3               │ yaml: yaml: Denial of Service via deeply nested YAML         │
│                 │                │          │        │                   │                             │ document parsing                                             │
│                 │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-33532                   │
└─────────────────┴────────────────┴──────────┴────────┴───────────────────┴─────────────────────────────┴──────────────────────────────────────────────────────────────┘

📣 Notices:
  - Version 0.70.0 of Trivy is now available, current version is 0.69.1

To suppress version checks, run Trivy scans with the --skip-version-check flag

See detailed reports in MegaLinter artifacts

MegaLinter is graciously provided by OX Security
Show us your support by starring ⭐ the repository

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependabot Dependabot issues and PRs npm Node.js issues and PRs

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants