424 vulnerabilities classified as CWE-611 (XML外部实体引用的不恰当限制(XXE)). AI Chinese analysis included.
CWE-611 represents a critical input validation weakness where applications improperly process XML documents containing external entity references. Attackers typically exploit this vulnerability by injecting malicious XML payloads that reference local files, remote servers, or internal network resources. This allows adversaries to perform server-side request forgery, read sensitive system files, or execute denial-of-service attacks by forcing the application to resolve dangerous URIs. To mitigate this risk, developers must rigorously disable XML external entity processing in their parsers. Implementing strict input validation, using safe XML libraries that inherently block external entities, and configuring parsers to reject any DTD or entity definitions are essential defensive measures. By ensuring that XML processors only handle expected, internal content, organizations can effectively prevent unauthorized data access and maintain the integrity of their systems against these sophisticated injection attacks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2018-1077 | Red Hat Spacewalk 安全漏洞 — spacewalk | 7.5 | - | 2018-03-14 |
| CVE-2018-0100 | Cisco AnyConnect Secure Mobility Client Profile Editor 安全漏洞 — Cisco AnyConnect | 6.1 | - | 2018-01-18 |
| CVE-2018-0108 | Cisco WebEx Meetings Server 信息泄露漏洞 — Cisco WebEx Meetings Server | 5.3 | - | 2018-01-18 |
| CVE-2017-7907 | Schneider Electric Wonderware Historian Client 安全漏洞 — Schneider Electric Wonderware Historian Client | 7.3 | - | 2017-05-19 |
Vulnerabilities classified as CWE-611 (XML外部实体引用的不恰当限制(XXE)) represent 424 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.