-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from unhandled ExpatError exceptions during XML parsing in the to_xml method. The GitHub patch shows a try-except block was added around parseString().toprettyxml() to catch ExpatError and convert it to a controlled InvalidDataError. Prior to this fix, the lack of exception handling in this specific code path (when self.pretty=True) made it possible for malformed input to crash the application via an uncaught UnicodeDecodeError/ExpatError, matching the CWE-248 and CWE-754 descriptions. The affected code is clearly identified in the pre-patch version of json2xml.py.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| json2xml | pip | >= 0, < 3.14.0 | 3.14.0 |
Ongoing coverage of React2Shell