When an input data has quotes in attribute values but process entities is not enabled, it breaks the attribute value into multiple attributes. This gives the room for an attacker to insert unwanted attributes to the XML/HTML.
Malicious Input
{
a: {
"@_attr": '" onClick="alert(1)'
}
}
Output
<a attr="" onClick="alert(1)"></a>
If you're not ignoring attributes then keep processEntities flag true.
{
"cwe_ids": [
"CWE-611",
"CWE-91"
],
"nvd_published_at": "2026-05-13T16:16:59Z",
"severity": "HIGH",
"github_reviewed_at": "2026-05-08T16:29:10Z",
"github_reviewed": true
}