Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-611 (XML外部实体引用的不恰当限制(XXE)) — Vulnerability Class 424

424 vulnerabilities classified as CWE-611 (XML外部实体引用的不恰当限制(XXE)). AI Chinese analysis included.

CWE-611 represents a critical input validation weakness where applications improperly process XML documents containing external entity references. Attackers typically exploit this vulnerability by injecting malicious XML payloads that reference local files, remote servers, or internal network resources. This allows adversaries to perform server-side request forgery, read sensitive system files, or execute denial-of-service attacks by forcing the application to resolve dangerous URIs. To mitigate this risk, developers must rigorously disable XML external entity processing in their parsers. Implementing strict input validation, using safe XML libraries that inherently block external entities, and configuring parsers to reject any DTD or entity definitions are essential defensive measures. By ensuring that XML processors only handle expected, internal content, organizations can effectively prevent unauthorized data access and maintain the integrity of their systems against these sophisticated injection attacks.

MITRE CWE Description
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Common Consequences (3)
ConfidentialityRead Application Data, Read Files or Directories
If the attacker is able to include a crafted DTD and a default entity resolver is enabled, the attacker may be able to access arbitrary files on the system. By submitting an XML file that defines an external entity with a file:// URI, an attacker can cause the processing application to read the co…
IntegrityBypass Protection Mechanism
An attacker may supply a crafted DTD using URIs with schemes such as http://, forcing the application to make outgoing HTTP requests to servers that the attacker cannot reach directly, which can be used to bypass firewall restrictions; hide the source of attacks such as port scanning; or otherwise l…
AvailabilityDoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory)
The product could consume excessive CPU cycles or memory using a URI that points to a large file, or a device that always returns data such as /dev/random. Alternately, the URI could reference a file that contains many nested or recursive entity references to further slow down parsing.
Mitigations (1)
Implementation, System ConfigurationMany XML parsers and validators can be configured to disable external entity expansion.
CVE IDTitleCVSSSeverityPublished
CVE-2018-25082 zwczou WeChat SDK Python to_xml xml external entity reference — WeChat SDK Python 6.3 Medium2023-03-21
CVE-2023-27874 IBM Aspera Faspex XML external entity injection — Aspera Faspex 9.9 Critical2023-03-21
CVE-2023-26461 XML External Entity (XXE) vulnerability in SAP NetWeaver (SAP Enterprise Portal) — NetWeaver (SAP Enterprise Portal) 6.8 Medium2023-03-14
CVE-2023-1288 ENOVIA Live Collaboration V6R2013xE is affected by an XML External Entity injection (XXE) vulnerability — ENOVIA Live Collaboration 6.8 Medium2023-03-09
CVE-2023-27476 XML External Entity (XXE) Injection in OWSLib — OWSLib 8.2 High2023-03-07
CVE-2023-27480 Data leak through a XAR import XXE attack in xwiki-platform-xar-model — xwiki-platform 7.7 High2023-03-07
CVE-2023-26043 XML External Entity (XXE) injection in GeoServer style upload functionality — geonode 6.5 Medium2023-02-27
CVE-2015-10082 UIKit0 libplist XML xplist.c plist_from_xml xml external entity reference — libplist 5.5 Medium2023-02-21
CVE-2016-15026 3breadt dd-plist xml external entity reference — dd-plist 5.3 Medium2023-02-20
CVE-2014-125087 java-xmlbuilder xml external entity reference — java-xmlbuilder 5.5 Medium2023-02-19
CVE-2022-39954 Fortinet FortiNAC 代码问题漏洞 — FortiNAC 6.9 High2023-02-16
CVE-2023-20052 ClamAV 安全漏洞 — Cisco Secure Endpoint 5.3 Medium2023-02-16
CVE-2023-23926 Neo4j 代码问题漏洞 — apoc 5.9 Medium2023-02-16
CVE-2023-22832 Apache NiFi: Improper Restriction of XML External Entity References in ExtractCCDAAttributes — Apache NiFi 7.5 -2023-02-10
CVE-2022-38389 IBM Tivoli Workload Scheduler XML external entity injection — Tivoli Workload Scheduler 7.1 High2023-02-02
CVE-2022-22486 IBM Tivoli Workload Scheduler XML external entity injection — Tivoli Workload Scheduler 10.0 Critical2023-02-02
CVE-2021-4311 Talend Open Studio for MDM XML xml external entity reference — Open Studio for MDM 5.5 Medium2023-01-09
CVE-2015-10029 kelvinmo simplexrd simplexrd.class.php xml external entity reference — simplexrd 5.5 Medium2023-01-07
CVE-2016-15011 e-Contract dssp SignResponseVerifier.java checkSignResponse xml external entity reference — dssp 5.5 Medium2023-01-06
CVE-2020-36641 gturri aXMLRPC ResponseParser.java ResponseParser xml external entity reference — aXMLRPC 5.5 Medium2023-01-05
CVE-2020-36640 bonitasoft bonita-connector-webservice SecureWSConnector.java TransformerConfigurationException xml external entity reference — bonita-connector-webservice 5.5 Medium2023-01-05
CVE-2017-20151 iText RUPS XfaFile.java xml external entity reference — RUPS 5.5 Medium2022-12-30
CVE-2021-4295 ONC code-validator-api XML CodeValidatorApiConfiguration.java vocabularyValidationConfigurations xml external entity reference — code-validator-api 5.5 Medium2022-12-29
CVE-2022-4818 Talend Open Studio for MDM SystemStorageWrapper.java xml external entity reference — Open Studio for MDM 5.5 Medium2022-12-28
CVE-2022-41967 Improper Restriction of XML External Entity Reference in Dragonfly — Dragonfly 7.0 High2022-12-27
CVE-2022-4607 3D City Database OGC Web Feature Service xml external entity reference — OGC Web Feature Service 5.5 Medium2022-12-18
CVE-2022-46827 JetBrains IntelliJ IDEA 代码问题漏洞 — IntelliJ IDEA 3.9 Low2022-12-08
CVE-2022-20938 Cisco Firepower Management Center 代码问题漏洞 — Cisco Firepower Management Center 4.3 Medium2022-11-10
CVE-2022-43570 XML External Entity Injection through a custom View in Splunk Enterprise — Splunk Enterprise 8.8 High2022-11-04
CVE-2022-3340 Trellix IPS Manager vulnerable to XXE — Trellix IPS Manager 5.9 Medium2022-11-04

Vulnerabilities classified as CWE-611 (XML外部实体引用的不恰当限制(XXE)) represent 424 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.