3.5
CVE-2024-8010
- EPSS 0%
- Veröffentlicht 16.04.2026 10:16:14
- Zuletzt bearbeitet 17.04.2026 15:38:09
- Quelle ed10eef1-636d-4fbe-9993-6890df
- CVE-Watchlists
- Unerledigt
The component accepts XML input through the publisher without disabling external entity resolution. This allows malicious actors to submit a crafted XML payload that exploits the unescaped external entity references. By leveraging this vulnerability, a malicious actor can read confidential files from the product's file system or access limited HTTP resources reachable via HTTP GET requests to the vulnerable product.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerWSO2
≫
Produkt
WSO2 API Manager
Default Statusunaffected
Version <
3.2.0
Version
0
Status
unknown
Version <
3.2.0.397
Version
3.2.0
Status
affected
Version <
3.2.1.27
Version
3.2.1
Status
affected
Version <
4.0.0.310
Version
4.0.0
Status
affected
Version <
4.0.0.319
Version
4.0.0
Status
affected
Version <
4.1.0.171
Version
4.1.0
Status
affected
Version <
4.2.0.127
Version
4.2.0
Status
affected
Version <
4.3.0.39
Version
4.3.0
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0% | 0.002 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| ed10eef1-636d-4fbe-9993-6890dfa878f8 | 3.5 | 2.1 | 1.4 |
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
|
CWE-611 Improper Restriction of XML External Entity Reference
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.