CVE-2021-23926

Severity
9.1CRITICAL
EPSS
0.4%
top 36.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 14
Latest updateJan 15

Description

The XML parsers used by XMLBeans up to version 2.6.0 did not set the properties needed to protect the user from malicious XML input. Vulnerabilities include possibilities for XML Entity Expansion attacks. Affects XMLBeans up to and including v2.6.0.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.2

Affected Packages6 packages

Debianxmlbeans< 3.0.2-1+3
NVDapache/xmlbeans2.6.0
CVEListV5apache_software_foundation/apache_xmlbeansApache XMLBeans2.6.0

Also affects: Debian Linux 9.0

Patches

🔴Vulnerability Details

4
GHSA
Improper Restriction of Recursive Entity References in Apache XMLBeans2021-06-16
OSV
Improper Restriction of Recursive Entity References in Apache XMLBeans2021-06-16
OSV
CVE-2021-23926: The XML parsers used by XMLBeans up to version 22021-01-14
CVEList
XMLBeans XML Entity Expansion2021-01-14

📋Vendor Advisories

10
Oracle
Oracle Oracle Analytics Risk Matrix: Core (Apache XMLBeans) — CVE-2021-239262026-01-15
Oracle
Oracle Oracle Analytics Risk Matrix: BI Platform Security (Apache XMLBeans) — CVE-2021-239262025-01-15
Oracle
Oracle Oracle Analytics Risk Matrix: BI FNDN (Apache XMLBeans) — CVE-2021-239262024-07-15
Oracle
Oracle Oracle Fusion Middleware Risk Matrix: Fabric Layer (Apache XMLBeans) — CVE-2021-239262023-07-15
Oracle
Oracle Oracle Analytics Risk Matrix: Visual Analyzer (Apache POI) — CVE-2021-239262023-04-15
CVE-2021-23926 (CRITICAL CVSS 9.1) | The XML parsers used by XMLBeans up | cvebase.io