Apache Xerces-C++ currently lacks active maintainers and therefore needs to tightly scope what security guarantees it provides.
We recommend that users that process untrusted input take their own precautions to make sure their applications fail gracefully when the input takes inappropriate amounts of memory or CPU to process.
Therefore we will no longer accept Denial of Service reports as security vulnerabilities. We will still consider reports where Xerces-C++ processes external paths (when it is correctly configured not to), or where it allows arbitrary code execution.