CWE-611
Improper Restriction of XML External Entity Reference
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
CVE-2023-47160 (GCVE-0-2023-47160)
Vulnerability from cvelistv5
Published
2025-02-19 16:20
Modified
2025-08-17 00:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-611 - Improper Restriction of XML External Entity Reference
Summary
IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0
is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.
References
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/7183597 | vendor-advisory, patch |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | IBM | Cognos Controller |
Version: 11.0.0 ≤ 11.0.1 cpe:2.3:a:ibm:controller:11.0.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:controller:11.0.1:*:*:*:*:*:*:* |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-47160", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-19T16:44:36.868285Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-19T16:44:46.227Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:ibm:controller:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:controller:11.0.1:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "Cognos Controller", "vendor": "IBM", "versions": [ { "changes": [ { "at": "FP3", "status": "affected" } ], "lessThanOrEqual": "11.0.1", "status": "affected", "version": "11.0.0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "Controller", "vendor": "IBM", "versions": [ { "status": "affected", "version": "11.1.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eis vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.\u003c/span\u003e\n\n\u003c/span\u003e\n\n\u003c/span\u003e\n\n\n\n\n\n\n\n\u003c/span\u003e" } ], "value": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\n\n\n\n\nis vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-17T00:10:00.333Z", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "vendor-advisory", "patch" ], "url": "https://www.ibm.com/support/pages/node/7183597" } ], "source": { "discovery": "UNKNOWN" }, "title": "IBM Cognos Controller XML external entity injection", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2023-47160", "datePublished": "2025-02-19T16:20:09.058Z", "dateReserved": "2023-10-31T00:13:45.654Z", "dateUpdated": "2025-08-17T00:10:00.333Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-7307 (GCVE-0-2023-7307)
Vulnerability from cvelistv5
Published
2025-08-27 21:26
Modified
2025-08-28 19:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-611 - Improper Restriction of XML External Entity Reference
Summary
Sangfor Behavior Management System (also referred to as DC Management System in Chinese-language documentation) contains an XML external entity (XXE) injection vulnerability in the /src/sangforindex endpoint. A remote unauthenticated attacker can submit crafted XML data containing external entity definitions, leading to potential disclosure of internal files, server-side request forgery (SSRF), or other impacts depending on parser behavior. The vulnerability is due to improper configuration of the XML parser, which allows resolution of external entities without restriction. This product is now integrated into their IAM (Internet Access Management) platform and an affected version range is undefined. Exploitation evidence was first observed by the Shadowserver Foundation on 2023-09-06 UTC.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Sangfor Technologies Co. Ltd. | Sangfor Behavior Management System (DC Management System) |
Version: * |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-7307", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-28T13:47:10.088260Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-28T13:47:20.377Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "/src/sangforindex" ], "product": "Sangfor Behavior Management System (DC Management System)", "vendor": "Sangfor Technologies Co. Ltd.", "versions": [ { "status": "affected", "version": "*" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Anonymouse User via CNBlogs" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Sangfor Behavior Management System (also referred to as DC Management System in Chinese-language documentation) contains an XML external entity (XXE) injection vulnerability in the /src/sangforindex endpoint. A remote unauthenticated attacker can submit crafted XML data containing external entity definitions, leading to potential disclosure of internal files, server-side request forgery (SSRF), or other impacts depending on parser behavior. The vulnerability is due to improper configuration of the XML parser, which allows resolution of external entities without restriction. This product is now\u0026nbsp;integrated into their IAM (Internet Access Management) platform and an affected version range is undefined.\u0026nbsp;Exploitation evidence was first observed by the Shadowserver Foundation on \u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e2023-09-06 UTC\u003c/span\u003e." } ], "value": "Sangfor Behavior Management System (also referred to as DC Management System in Chinese-language documentation) contains an XML external entity (XXE) injection vulnerability in the /src/sangforindex endpoint. A remote unauthenticated attacker can submit crafted XML data containing external entity definitions, leading to potential disclosure of internal files, server-side request forgery (SSRF), or other impacts depending on parser behavior. The vulnerability is due to improper configuration of the XML parser, which allows resolution of external entities without restriction. This product is now\u00a0integrated into their IAM (Internet Access Management) platform and an affected version range is undefined.\u00a0Exploitation evidence was first observed by the Shadowserver Foundation on 2023-09-06 UTC." } ], "impacts": [ { "capecId": "CAPEC-250", "descriptions": [ { "lang": "en", "value": "CAPEC-250 XML Injection" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-28T19:45:31.965Z", "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "shortName": "VulnCheck" }, "references": [ { "tags": [ "technical-description", "exploit" ], "url": "https://www.cnblogs.com/pursue-security/p/17666126.html" }, { "tags": [ "product" ], "url": "https://support.sangfor.com.cn/productDocument/read?product_id=22\u0026version_id=329\u0026category_id=261800" }, { "tags": [ "product" ], "url": "https://www.sangfor.com/blog/cybersecurity/launching-sangfor-iam-12-0-23-manage-risky-shadow-it-right-way" }, { "tags": [ "third-party-advisory" ], "url": "https://www.vulncheck.com/advisories/sangfor-behavior-management-system-xml-external-entity-injection" } ], "source": { "discovery": "UNKNOWN" }, "tags": [ "x_known-exploited-vulnerability" ], "title": "Sangfor Behavior Management System XML External Entity Injection", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "assignerShortName": "VulnCheck", "cveId": "CVE-2023-7307", "datePublished": "2025-08-27T21:26:14.907Z", "dateReserved": "2025-08-25T17:43:13.161Z", "dateUpdated": "2025-08-28T19:45:31.965Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-34102 (GCVE-0-2024-34102)
Vulnerability from cvelistv5
Published
2024-06-13 09:04
Modified
2025-07-30 01:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-611 - Improper Restriction of XML External Entity Reference ('XXE') ()
Summary
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Adobe | Adobe Commerce |
Version: 0 ≤ 2.4.4-p8 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "commerce", "vendor": "adobe", "versions": [ { "lessThanOrEqual": "2.4.7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.6-p5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.5-p7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.4-p8", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.3-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.2-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.1-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.0-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.3.7-p4-ext-7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "commerce", "vendor": "adobe", "versions": [ { "lessThanOrEqual": "2.4.7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.6-p5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.5-p7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.4-p8", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.3-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.2-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.1-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.0-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.3.7-p4-ext-7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "commerce", "vendor": "adobe", "versions": [ { "lessThanOrEqual": "2.4.7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.6-p5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.5-p7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.4-p8", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.3-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.2-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.1-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.0-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.3.7-p4-ext-7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "commerce", "vendor": "adobe", "versions": [ { "lessThanOrEqual": "2.4.7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.6-p5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.5-p7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.4-p8", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.3-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.2-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.1-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.0-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.3.7-p4-ext-7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "commerce", "vendor": "adobe", "versions": [ { "lessThanOrEqual": "2.4.7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.6-p5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.5-p7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.4-p8", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.3-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.2-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.1-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.0-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.3.7-p4-ext-7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "commerce", "vendor": "adobe", "versions": [ { "lessThanOrEqual": "2.4.7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.6-p5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.5-p7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.4-p8", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.3-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.2-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.1-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.0-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.3.7-p4-ext-7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "commerce", "vendor": "adobe", "versions": [ { "lessThanOrEqual": "2.4.7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.6-p5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.5-p7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.4-p8", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.3-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.2-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.1-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.0-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.3.7-p4-ext-7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "commerce", "vendor": "adobe", "versions": [ { "lessThanOrEqual": "2.4.7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.6-p5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.5-p7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.4-p8", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.3-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.2-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.1-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.0-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.3.7-p4-ext-7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "commerce", "vendor": "adobe", "versions": [ { "lessThanOrEqual": "2.4.7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.6-p5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.5-p7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.4-p8", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.3-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.2-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.1-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.4.0-ext-7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "2.3.7-p4-ext-7", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-34102", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-18T03:55:19.256192Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2024-07-17", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-34102" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:37:00.927Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2024-07-17T00:00:00+00:00", "value": "CVE-2024-34102 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.911Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/magento/apsb24-40.html" }, { "tags": [ "x_transferred" ], "url": "https://www.vicarius.io/vsociety/posts/cosmicsting-critical-unauthenticated-xxe-vulnerability-in-adobe-commerce-and-magento-cve-2024-34102" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Adobe Commerce", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "2.4.4-p8", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2024-06-11T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference (\u0027XXE\u0027) vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "availabilityRequirement": "NOT_DEFINED", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 9.8, "environmentalSeverity": "CRITICAL", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "HIGH", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "NETWORK", "modifiedAvailabilityImpact": "HIGH", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "HIGH", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "NONE", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 9.8, "temporalSeverity": "CRITICAL", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "Improper Restriction of XML External Entity Reference (\u0027XXE\u0027) (CWE-611)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-03T16:00:03.226Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/magento/apsb24-40.html" }, { "url": "https://www.vicarius.io/vsociety/posts/cosmicsting-critical-unauthenticated-xxe-vulnerability-in-adobe-commerce-and-magento-cve-2024-34102" } ], "source": { "discovery": "EXTERNAL" }, "title": "XXE can expose crypt key and other secrets granting full admin access" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2024-34102", "datePublished": "2024-06-13T09:04:56.093Z", "dateReserved": "2024-04-30T19:50:50.900Z", "dateUpdated": "2025-07-30T01:37:00.927Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-49781 (GCVE-0-2024-49781)
Vulnerability from cvelistv5
Published
2025-02-20 12:04
Modified
2025-08-15 14:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-611 - Improper Restriction of XML External Entity Reference
Summary
IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.
References
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/7183541 | vendor-advisory, patch |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | OpenPages with Watson |
Version: 8.3 Version: 9.0 cpe:2.3:a:ibm:openpages_with_watson:8.3:*:*:*:*:*:*:* cpe:2.3:a:ibm:openpages_with_watson:9.0:*:*:*:*:*:*:* |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-49781", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-20T14:03:44.279354Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-20T14:07:51.515Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:ibm:openpages_with_watson:8.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:openpages_with_watson:9.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "OpenPages with Watson", "vendor": "IBM", "versions": [ { "status": "affected", "version": "8.3" }, { "status": "affected", "version": "9.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources." } ], "value": "IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-15T14:47:19.924Z", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "vendor-advisory", "patch" ], "url": "https://www.ibm.com/support/pages/node/7183541" } ], "source": { "discovery": "UNKNOWN" }, "title": "IBM OpenPages XML external entity injection", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2024-49781", "datePublished": "2025-02-20T12:04:56.750Z", "dateReserved": "2024-10-20T13:40:05.753Z", "dateUpdated": "2025-08-15T14:47:19.924Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-0162 (GCVE-0-2025-0162)
Vulnerability from cvelistv5
Published
2025-03-07 16:38
Modified
2025-09-01 01:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-611 - Improper Restriction of XML External Entity Reference
Summary
IBM Aspera Shares 1.9.9 through 1.10.0 PL7 is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote authenticated attacker could exploit this vulnerability to expose sensitive information or consume memory resources.
References
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/7185096 | vendor-advisory, patch |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Aspera Shares |
Version: 1.9.9 ≤ 1.10.0 PL7 cpe:2.3:a:ibm:aspera_shares:1.9.9:*:*:*:*:*:*:* cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level7:*:*:*:*:*:* |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0162", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-07T17:22:39.687238Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-07T17:22:57.063Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:ibm:aspera_shares:1.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level7:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "Aspera Shares", "vendor": "IBM", "versions": [ { "lessThanOrEqual": "1.10.0 PL7", "status": "affected", "version": "1.9.9", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "IBM Aspera Shares 1.9.9 through 1.10.0 PL7 is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote authenticated attacker could exploit this vulnerability to expose sensitive information or consume memory resources." } ], "value": "IBM Aspera Shares 1.9.9 through 1.10.0 PL7 is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote authenticated attacker could exploit this vulnerability to expose sensitive information or consume memory resources." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-01T01:08:29.283Z", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "vendor-advisory", "patch" ], "url": "https://www.ibm.com/support/pages/node/7185096" } ], "source": { "discovery": "UNKNOWN" }, "title": "IBM Aspera Shares XML external entity injection", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2025-0162", "datePublished": "2025-03-07T16:38:40.598Z", "dateReserved": "2024-12-31T19:09:13.934Z", "dateUpdated": "2025-09-01T01:08:29.283Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-10091 (GCVE-0-2025-10091)
Vulnerability from cvelistv5
Published
2025-09-08 11:02
Modified
2025-09-08 13:38
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability has been found in Jinher OA up to 1.2. This affects an unknown function of the file /c6/Jhsoft.Web.projectmanage/ProjectManage/XmlHttp.aspx/?Type=add of the component XML Handler. The manipulation leads to xml external entity reference. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.323046 | vdb-entry | |
https://vuldb.com/?ctiid.323046 | signature, permissions-required | |
https://vuldb.com/?submit.644864 | third-party-advisory | |
https://github.com/Cstarplus/CVE/issues/2 | exploit, issue-tracking |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-10091", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-08T13:37:42.732067Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-08T13:38:24.967Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "XML Handler" ], "product": "OA", "vendor": "Jinher", "versions": [ { "status": "affected", "version": "1.0" }, { "status": "affected", "version": "1.1" }, { "status": "affected", "version": "1.2" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "abc_123456 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Jinher OA up to 1.2. This affects an unknown function of the file /c6/Jhsoft.Web.projectmanage/ProjectManage/XmlHttp.aspx/?Type=add of the component XML Handler. The manipulation leads to xml external entity reference. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "In Jinher OA bis 1.2 wurde eine Schwachstelle gefunden. Es betrifft eine unbekannte Funktion der Datei /c6/Jhsoft.Web.projectmanage/ProjectManage/XmlHttp.aspx/?Type=add der Komponente XML Handler. Durch Beeinflussen mit unbekannten Daten kann eine xml external entity reference-Schwachstelle ausgenutzt werden. Der Angriff kann remote ausgef\u00fchrt werden. Der Exploit wurde der \u00d6ffentlichkeit bekannt gemacht und k\u00f6nnte verwendet werden." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "XML External Entity Reference", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-610", "description": "Externally Controlled Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-08T11:02:06.958Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-323046 | Jinher OA XML Type xml external entity reference", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.323046" }, { "name": "VDB-323046 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.323046" }, { "name": "Submit #644864 | Jinher OA V1.2 XML External Entity Reference", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.644864" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/Cstarplus/CVE/issues/2" } ], "timeline": [ { "lang": "en", "time": "2025-09-08T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-09-08T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-09-08T07:03:07.000Z", "value": "VulDB entry last update" } ], "title": "Jinher OA XML Type xml external entity reference" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-10091", "datePublished": "2025-09-08T11:02:06.958Z", "dateReserved": "2025-09-08T04:57:59.525Z", "dateUpdated": "2025-09-08T13:38:24.967Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-10092 (GCVE-0-2025-10092)
Vulnerability from cvelistv5
Published
2025-09-08 11:32
Modified
2025-09-08 13:33
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability was found in Jinher OA up to 1.2. This impacts an unknown function of the file /c6/Jhsoft.Web.projectmanage/TaskManage/AddTask.aspx/?Type=add of the component XML Handler. The manipulation results in xml external entity reference. The attack can be executed remotely. The exploit has been made public and could be used.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.323047 | vdb-entry | |
https://vuldb.com/?ctiid.323047 | signature, permissions-required | |
https://vuldb.com/?submit.644868 | third-party-advisory | |
https://github.com/Cstarplus/CVE/issues/3 | exploit, issue-tracking |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-10092", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-08T13:33:20.332442Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-08T13:33:31.403Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "XML Handler" ], "product": "OA", "vendor": "Jinher", "versions": [ { "status": "affected", "version": "1.0" }, { "status": "affected", "version": "1.1" }, { "status": "affected", "version": "1.2" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "abc_123456 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Jinher OA up to 1.2. This impacts an unknown function of the file /c6/Jhsoft.Web.projectmanage/TaskManage/AddTask.aspx/?Type=add of the component XML Handler. The manipulation results in xml external entity reference. The attack can be executed remotely. The exploit has been made public and could be used." }, { "lang": "de", "value": "In Jinher OA bis 1.2 ist eine Schwachstelle entdeckt worden. Das betrifft eine unbekannte Funktionalit\u00e4t der Datei /c6/Jhsoft.Web.projectmanage/TaskManage/AddTask.aspx/?Type=add der Komponente XML Handler. Die Manipulation f\u00fchrt zu xml external entity reference. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Die Schwachstelle wurde \u00f6ffentlich offengelegt und k\u00f6nnte ausgenutzt werden." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "XML External Entity Reference", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-610", "description": "Externally Controlled Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-08T11:32:06.165Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-323047 | Jinher OA XML Type xml external entity reference", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.323047" }, { "name": "VDB-323047 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.323047" }, { "name": "Submit #644868 | Jinher OA V1.2 XML External Entity Reference", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.644868" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/Cstarplus/CVE/issues/3" } ], "timeline": [ { "lang": "en", "time": "2025-09-08T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-09-08T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-09-08T07:03:08.000Z", "value": "VulDB entry last update" } ], "title": "Jinher OA XML Type xml external entity reference" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-10092", "datePublished": "2025-09-08T11:32:06.165Z", "dateReserved": "2025-09-08T04:58:02.481Z", "dateUpdated": "2025-09-08T13:33:31.403Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-10183 (GCVE-0-2025-10183)
Vulnerability from cvelistv5
Published
2025-09-09 14:50
Modified
2025-09-09 15:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-611 - Improper Restriction of XML External Entity Reference
Summary
A blind XML External Entity (XXE) injection in the OpenMessaging webservice in TecCom TecConnect 4.1 allows an unauthenticated attacker to exfiltrate arbitrary files to an attacker-controlled server. TecConnect 4.1 is considered end-of-life as of December 2023. Users are advised to upgrade to TecCom Connect 5.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
TecCom | TecConnect |
Version: 4.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-10183", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-09T15:14:49.713952Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-09T15:14:59.774Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "TecConnect", "vendor": "TecCom", "versions": [ { "status": "affected", "version": "4.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A blind XML External Entity (XXE) injection in the OpenMessaging webservice in TecCom TecConnect 4.1 allows an unauthenticated attacker to exfiltrate arbitrary files to an attacker-controlled server. TecConnect 4.1 is considered end-of-life as of December 2023. Users are advised to upgrade to TecCom Connect 5." } ], "value": "A blind XML External Entity (XXE) injection in the OpenMessaging webservice in TecCom TecConnect 4.1 allows an unauthenticated attacker to exfiltrate arbitrary files to an attacker-controlled server. TecConnect 4.1 is considered end-of-life as of December 2023. Users are advised to upgrade to TecCom Connect 5." } ], "impacts": [ { "capecId": "CAPEC-201", "descriptions": [ { "lang": "en", "value": "CAPEC-201 XML Entity Linking" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-09T14:50:42.841Z", "orgId": "27b6da8a-f51d-48d9-9eef-9b7f3405d20d", "shortName": "BLSOPS" }, "references": [ { "url": "https://blog.blacklanternsecurity.com/p/teccom-tecconnect-41-xml-external" } ], "source": { "discovery": "UNKNOWN" }, "title": "XML External Entity Injection in TecConnect 4.1", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "27b6da8a-f51d-48d9-9eef-9b7f3405d20d", "assignerShortName": "BLSOPS", "cveId": "CVE-2025-10183", "datePublished": "2025-09-09T14:50:22.152Z", "dateReserved": "2025-09-09T14:41:44.314Z", "dateUpdated": "2025-09-09T15:14:59.774Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-26400 (GCVE-0-2025-26400)
Vulnerability from cvelistv5
Published
2025-07-29 08:07
Modified
2025-07-29 13:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-611 - Improper Restriction of XML External Entity Reference
Summary
SolarWinds Web Help Desk was reported to be affected by an XML External Entity Injection (XXE) vulnerability that could lead to information disclosure. A valid, low-privilege access is required unless the attacker had access to the local server to modify configuration files.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SolarWinds | Web Help Desk |
Version: 12.8.6 and previous versions |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-26400", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-29T13:47:11.601984Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-29T13:47:18.609Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Web Help Desk", "vendor": "SolarWinds", "versions": [ { "status": "affected", "version": "12.8.6 and previous versions" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "DieuLink, Nhiephon, and chung96vn from GCSC Vietnam" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "SolarWinds Web Help Desk was reported to be affected by an XML External Entity Injection (XXE) vulnerability that could lead to information disclosure. A valid, low-privilege access is required unless the attacker had access to the local server to modify configuration files." } ], "value": "SolarWinds Web Help Desk was reported to be affected by an XML External Entity Injection (XXE) vulnerability that could lead to information disclosure. A valid, low-privilege access is required unless the attacker had access to the local server to modify configuration files." } ], "impacts": [ { "capecId": "CAPEC-201", "descriptions": [ { "lang": "en", "value": "CAPEC-201 XML Entity Linking" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-29T08:07:38.230Z", "orgId": "49f11609-934d-4621-84e6-e02e032104d6", "shortName": "SolarWinds" }, "references": [ { "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-26400" }, { "url": "https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_12-8-7_release_notes.htm" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "SolarWinds recommends customers upgrade to Web Help Desk version 12.8.7 as soon as is practical.\u003cbr\u003e" } ], "value": "SolarWinds recommends customers upgrade to Web Help Desk version 12.8.7 as soon as is practical." } ], "source": { "discovery": "EXTERNAL" }, "title": "SolarWinds Web Help Desk XML External Entity Injection (XXE) Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "49f11609-934d-4621-84e6-e02e032104d6", "assignerShortName": "SolarWinds", "cveId": "CVE-2025-26400", "datePublished": "2025-07-29T08:07:38.230Z", "dateReserved": "2025-02-08T00:19:09.395Z", "dateUpdated": "2025-07-29T13:47:18.609Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-26484 (GCVE-0-2025-26484)
Vulnerability from cvelistv5
Published
2025-08-14 14:24
Modified
2025-08-14 14:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-611 - Improper Restriction of XML External Entity Reference
Summary
Dell CloudLink, versions 8.0 through 8.1.1, contains an Improper Restriction of XML External Entity Reference vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-26484", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T14:47:55.328704Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T14:48:08.369Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "CloudLink", "vendor": "Dell", "versions": [ { "lessThanOrEqual": "8.1.1", "status": "affected", "version": "8.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Dell would like to thank n3k From TIANGONG Team of Legendsec at QI-ANXIN Group for reporting this issue" } ], "datePublic": "2025-08-13T17:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dell CloudLink, versions 8.0 through 8.1.1, contains an Improper Restriction of XML External Entity Reference vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service." } ], "value": "Dell CloudLink, versions 8.0 through 8.1.1, contains an Improper Restriction of XML External Entity Reference vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611: Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T14:24:13.765Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000356343/dsa-2025-321-security-update-for-dell-cloudlink-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2025-26484", "datePublished": "2025-08-14T14:24:13.765Z", "dateReserved": "2025-02-11T06:06:12.147Z", "dateUpdated": "2025-08-14T14:48:08.369Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation
Phases: Implementation, System Configuration
Description:
- Many XML parsers and validators can be configured to disable external entity expansion.
CAPEC-221: Data Serialization External Entities Blowup
This attack takes advantage of the entity replacement property of certain data serialization languages (e.g., XML, YAML, etc.) where the value of the replacement is a URI. A well-crafted file could have the entity refer to a URI that consumes a large amount of resources to create a denial of service condition. This can cause the system to either freeze, crash, or execute arbitrary code depending on the URI.