Skip to content

Build(deps): Bump fast-xml-builder from 1.1.4 to 1.2.0#289

Open
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/npm_and_yarn/fast-xml-builder-1.2.0
Open

Build(deps): Bump fast-xml-builder from 1.1.4 to 1.2.0#289
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/npm_and_yarn/fast-xml-builder-1.2.0

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot Bot commented on behalf of github May 8, 2026

Bumps fast-xml-builder from 1.1.4 to 1.2.0.

Changelog

Sourced from fast-xml-builder's changelog.

1.2.0 (2026-05-08)

  • Add support for sanitizeName option
  • Support xml-naming for validating and sanitizing tag and attribute names

1.1.9 (2026-05-06)

  • fix: format output for preserve order when indent by is set to empty string

1.1.8 (2026-05-05)

  • fix: skip text property for PI tags
  • improve typings

1.1.7 (2026--05-04)

  • fix security issues when attribute value contains quotes

1.1.6 (2026--05-04)

  • fix security issues related to comment
  • skip comment with null value

1.1.5 (2026-04-17)

  • fix security issues related to comment and cdata

1.1.4 (2026-03-16)

  • support maxNestedTags option

1.1.3 (2026-03-13)

  • declare Matcher & Expression as unknown so user is not forced to install path-expression-matcher

1.1.2 (2026-03-11)

  • fix typings

1.1.1 (2026-03-11)

  • upgrade path-expression-matcher to 1.1.3

1.1.0 (2026-03-10)

Commits

@dependabot dependabot Bot added dependabot Dependabot issues and PRs npm Node.js issues and PRs labels May 8, 2026
@dependabot dependabot Bot requested a review from ncalteen as a code owner May 8, 2026 16:56
@dependabot dependabot Bot added dependabot Dependabot issues and PRs npm Node.js issues and PRs labels May 8, 2026
@github-actions
Copy link
Copy Markdown

github-actions Bot commented May 8, 2026

MegaLinter analysis: Error

Descriptor Linter Files Fixed Errors Warnings Elapsed time
✅ ACTION actionlint 5 0 0 0.24s
✅ JAVASCRIPT prettier 19 0 0 1.23s
✅ JSON npm-package-json-lint yes no no 0.94s
✅ JSON prettier 29 0 0 4.94s
✅ MARKDOWN markdownlint 10 0 0 0.94s
✅ REPOSITORY checkov yes no no 29.56s
✅ REPOSITORY gitleaks yes no no 2.27s
✅ REPOSITORY git_diff yes no no 0.02s
❌ REPOSITORY grype yes 6 no 65.98s
✅ REPOSITORY secretlint yes no no 1.26s
✅ REPOSITORY syft yes no no 4.59s
❌ REPOSITORY trivy yes 1 no 15.84s
✅ REPOSITORY trivy-sbom yes no no 4.16s
✅ REPOSITORY trufflehog yes no no 47.58s
✅ TYPESCRIPT prettier 108 0 0 3.62s
✅ YAML prettier 25 0 0 1.0s
✅ YAML yamllint 25 0 0 0.71s

Detailed Issues

❌ REPOSITORY / grype - 6 errors
[0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal) from=syft
NAME             INSTALLED  FIXED IN  TYPE  VULNERABILITY        SEVERITY  EPSS           RISK   
lodash           4.17.23    4.18.0    npm   GHSA-r5fr-rjxr-66jc  High      < 0.1% (11th)  < 0.1  
yaml             2.8.2      2.8.3     npm   GHSA-48c2-rrv3-qjmp  Medium    < 0.1% (18th)  < 0.1  
lodash           4.17.23    4.18.0    npm   GHSA-f23m-r3pf-42rh  Medium    < 0.1% (7th)   < 0.1  
brace-expansion  1.1.12     1.1.13    npm   GHSA-f886-m6hf-6m8v  Medium    < 0.1% (6th)   < 0.1  
brace-expansion  2.0.2      2.0.3     npm   GHSA-f886-m6hf-6m8v  Medium    < 0.1% (6th)   < 0.1  
fast-xml-parser  5.5.7      5.7.0     npm   GHSA-gh4j-gqv2-49f6  Medium    N/A            N/A
[0065] ERROR discovered vulnerabilities at or above the severity threshold
❌ REPOSITORY / trivy - 1 error
2026-05-09T02:35:26Z	INFO	[vulndb] Need to update DB
2026-05-09T02:35:26Z	INFO	[vulndb] Downloading vulnerability DB...
2026-05-09T02:35:26Z	INFO	[vulndb] Downloading artifact...	repo="mirror.gcr.io/aquasec/trivy-db:2"
18.83 MiB / 92.41 MiB [------------>________________________________________________] 20.37% ? p/s ?46.98 MiB / 92.41 MiB [------------------------------->_____________________________] 50.84% ? p/s ?72.86 MiB / 92.41 MiB [------------------------------------------------>____________] 78.84% ? p/s ?92.41 MiB / 92.41 MiB [--------------------------------------------->] 100.00% 122.64 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [--------------------------------------------->] 100.00% 122.64 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [--------------------------------------------->] 100.00% 122.64 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [--------------------------------------------->] 100.00% 114.73 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [--------------------------------------------->] 100.00% 114.73 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [--------------------------------------------->] 100.00% 114.73 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [--------------------------------------------->] 100.00% 107.33 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [--------------------------------------------->] 100.00% 107.33 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [--------------------------------------------->] 100.00% 107.33 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [--------------------------------------------->] 100.00% 100.41 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [--------------------------------------------->] 100.00% 100.41 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [--------------------------------------------->] 100.00% 100.41 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 93.93 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 93.93 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 93.93 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 87.87 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 87.87 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 87.87 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 82.20 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 82.20 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 82.20 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 76.90 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 76.90 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 76.90 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 71.93 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [-------------------------------------------------] 100.00% 16.92 MiB p/s 5.7s2026-05-09T02:35:33Z	INFO	[vulndb] Artifact successfully downloaded	repo="mirror.gcr.io/aquasec/trivy-db:2"
2026-05-09T02:35:33Z	INFO	[vuln] Vulnerability scanning is enabled
2026-05-09T02:35:33Z	INFO	[misconfig] Misconfiguration scanning is enabled
2026-05-09T02:35:33Z	INFO	[checks-client] Need to update the checks bundle
2026-05-09T02:35:33Z	INFO	[checks-client] Downloading the checks bundle...
234.65 KiB / 234.65 KiB [------------------------------------------------------] 100.00% ? p/s 100ms2026-05-09T02:35:41Z	INFO	Suppressing dependencies for development and testing. To display them, try the '--include-dev-deps' flag.
2026-05-09T02:35:41Z	INFO	Number of language-specific files	num=1
2026-05-09T02:35:41Z	INFO	[npm] Detecting vulnerabilities...
2026-05-09T02:35:41Z	INFO	Detected config files	num=0

Report Summary

┌───────────────────┬──────┬─────────────────┬───────────────────┐
│      Target       │ Type │ Vulnerabilities │ Misconfigurations │
├───────────────────┼──────┼─────────────────┼───────────────────┤
│ package-lock.json │ npm  │        6        │         -         │
└───────────────────┴──────┴─────────────────┴───────────────────┘
Legend:
- '-': Not scanned
- '0': Clean (no security findings detected)


For OSS Maintainers: VEX Notice
--------------------------------
If you're an OSS maintainer and Trivy has detected vulnerabilities in your project that you believe are not actually exploitable, consider issuing a VEX (Vulnerability Exploitability eXchange) statement.
VEX allows you to communicate the actual status of vulnerabilities in your project, improving security transparency and reducing false positives for your users.
Learn more and start using VEX: https://trivy.dev/docs/v0.69/guide/supply-chain/vex/repo#publishing-vex-documents

To disable this notice, set the TRIVY_DISABLE_VEX_NOTICE environment variable.


package-lock.json (npm)
=======================
Total: 6 (UNKNOWN: 0, LOW: 0, MEDIUM: 5, HIGH: 1, CRITICAL: 0)

┌─────────────────┬────────────────┬──────────┬────────┬───────────────────┬─────────────────────────────┬──────────────────────────────────────────────────────────────┐
│     Library     │ Vulnerability  │ Severity │ Status │ Installed Version │        Fixed Version        │                            Title                             │
├─────────────────┼────────────────┼──────────┼────────┼───────────────────┼─────────────────────────────┼──────────────────────────────────────────────────────────────┤
│ brace-expansion │ CVE-2026-33750 │ MEDIUM   │ fixed  │ 1.1.12            │ 5.0.5, 3.0.2, 2.0.3, 1.1.13 │ brace-expansion: brace-expansion: Denial of Service via zero │
│                 │                │          │        │                   │                             │ step value in brace pattern...                               │
│                 │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-33750                   │
│                 │                │          │        ├───────────────────┤                             │                                                              │
│                 │                │          │        │ 2.0.2             │                             │                                                              │
│                 │                │          │        │                   │                             │                                                              │
│                 │                │          │        │                   │                             │                                                              │
├─────────────────┼────────────────┤          │        ├───────────────────┼─────────────────────────────┼──────────────────────────────────────────────────────────────┤
│ fast-xml-parser │ CVE-2026-41650 │          │        │ 5.5.7             │ 5.7.0                       │ fast-xml-parser XMLBuilder: XML Comment and CDATA Injection  │
│                 │                │          │        │                   │                             │ via Unescaped Delimiters                                     │
│                 │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-41650                   │
├─────────────────┼────────────────┼──────────┤        ├───────────────────┼─────────────────────────────┼──────────────────────────────────────────────────────────────┤
│ lodash          │ CVE-2026-4800  │ HIGH     │        │ 4.17.23           │ 4.18.0                      │ lodash: lodash: Arbitrary code execution via untrusted input │
│                 │                │          │        │                   │                             │ in template imports                                          │
│                 │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-4800                    │
│                 ├────────────────┼──────────┤        │                   │                             ├──────────────────────────────────────────────────────────────┤
│                 │ CVE-2026-2950  │ MEDIUM   │        │                   │                             │ lodash: Lodash: Prototype pollution allows deletion of       │
│                 │                │          │        │                   │                             │ built-in prototype properties via array...                   │
│                 │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-2950                    │
├─────────────────┼────────────────┤          │        ├───────────────────┼─────────────────────────────┼──────────────────────────────────────────────────────────────┤
│ yaml            │ CVE-2026-33532 │          │        │ 2.8.2             │ 2.8.3, 1.10.3               │ yaml: yaml: Denial of Service via deeply nested YAML         │
│                 │                │          │        │                   │                             │ document parsing                                             │
│                 │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-33532                   │
└─────────────────┴────────────────┴──────────┴────────┴───────────────────┴─────────────────────────────┴──────────────────────────────────────────────────────────────┘

📣 Notices:
  - Version 0.70.0 of Trivy is now available, current version is 0.69.1

To suppress version checks, run Trivy scans with the --skip-version-check flag

See detailed reports in MegaLinter artifacts

MegaLinter is graciously provided by OX Security
Show us your support by starring ⭐ the repository

Bumps [fast-xml-builder](https://github.com/NaturalIntelligence/fast-xml-builder) from 1.1.4 to 1.2.0.
- [Changelog](https://github.com/NaturalIntelligence/fast-xml-builder/blob/main/CHANGELOG.md)
- [Commits](NaturalIntelligence/fast-xml-builder@v1.1.4...v1.2.0)

---
updated-dependencies:
- dependency-name: fast-xml-builder
  dependency-version: 1.2.0
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot Bot force-pushed the dependabot/npm_and_yarn/fast-xml-builder-1.2.0 branch from da44fd0 to 3850be3 Compare May 9, 2026 02:33
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependabot Dependabot issues and PRs npm Node.js issues and PRs

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants