Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-59qf-vrm9-q977

Опубликовано: 17 нояб. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 7.1

Описание

PDFPatcher thru 1.1.3.4663 executable's XML bookmark import functionality does not restrict XML external entity (XXE) references. The application uses .NET's XmlDocument class without disabling external entity resolution, enabling attackers to: Read arbitrary files from the victim's filesystem, exfiltrate sensitive data via out-of-band (OOB) HTTP requests, perform SSRF attacks against internal network resources, or cause a denial of service via entity expansion attacks.

PDFPatcher thru 1.1.3.4663 executable's XML bookmark import functionality does not restrict XML external entity (XXE) references. The application uses .NET's XmlDocument class without disabling external entity resolution, enabling attackers to: Read arbitrary files from the victim's filesystem, exfiltrate sensitive data via out-of-band (OOB) HTTP requests, perform SSRF attacks against internal network resources, or cause a denial of service via entity expansion attacks.

EPSS

Процентиль: 18%
0.00058
Низкий

7.1 High

CVSS3

Дефекты

CWE-611

Связанные уязвимости

CVSS3: 7.1
nvd
29 дней назад

PDFPatcher thru 1.1.3.4663 executable's XML bookmark import functionality does not restrict XML external entity (XXE) references. The application uses .NET's XmlDocument class without disabling external entity resolution, enabling attackers to: Read arbitrary files from the victim's filesystem, exfiltrate sensitive data via out-of-band (OOB) HTTP requests, perform SSRF attacks against internal network resources, or cause a denial of service via entity expansion attacks.

EPSS

Процентиль: 18%
0.00058
Низкий

7.1 High

CVSS3

Дефекты

CWE-611