Vulnerability Description
SVGO, short for SVG Optimizer, is a Node.js library and command-line application for optimizing SVG files. From version 2.1.0 to before version 2.8.1, from version 3.0.0 to before version 3.3.3, and before version 4.0.1, SVGO accepts XML with custom entities, without guards against entity expansion or recursion. This can result in a small XML file (811 bytes) stalling the application and even crashing the Node.js process with JavaScript heap out of memory. This issue has been patched in versions 2.8.1, 3.3.3, and 4.0.1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Svgo | Svgo | >= 2.1.0, < 2.8.1 |
Related Weaknesses (CWE)
References
- https://github.com/svg/svgo/security/advisories/GHSA-xpqw-6gx7-v673ExploitMitigationVendor Advisory
FAQ
What is CVE-2026-29074?
CVE-2026-29074 is a vulnerability with a CVSS score of 7.5 (HIGH). SVGO, short for SVG Optimizer, is a Node.js library and command-line application for optimizing SVG files. From version 2.1.0 to before version 2.8.1, from version 3.0.0 to before version 3.3.3, and b...
How severe is CVE-2026-29074?
CVE-2026-29074 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-29074?
Check the references section above for vendor advisories and patch information. Affected products include: Svgo Svgo.