Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-59qf-vrm9-q977

Опубликовано: 17 нояб. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 7.1

Описание

PDFPatcher thru 1.1.3.4663 executable's XML bookmark import functionality does not restrict XML external entity (XXE) references. The application uses .NET's XmlDocument class without disabling external entity resolution, enabling attackers to: Read arbitrary files from the victim's filesystem, exfiltrate sensitive data via out-of-band (OOB) HTTP requests, perform SSRF attacks against internal network resources, or cause a denial of service via entity expansion attacks.

PDFPatcher thru 1.1.3.4663 executable's XML bookmark import functionality does not restrict XML external entity (XXE) references. The application uses .NET's XmlDocument class without disabling external entity resolution, enabling attackers to: Read arbitrary files from the victim's filesystem, exfiltrate sensitive data via out-of-band (OOB) HTTP requests, perform SSRF attacks against internal network resources, or cause a denial of service via entity expansion attacks.

EPSS

Процентиль: 27%
0.00095
Низкий

7.1 High

CVSS3

Дефекты

CWE-611

Связанные уязвимости

CVSS3: 7.1
nvd
3 месяца назад

PDFPatcher thru 1.1.3.4663 executable's XML bookmark import functionality does not restrict XML external entity (XXE) references. The application uses .NET's XmlDocument class without disabling external entity resolution, enabling attackers to: Read arbitrary files from the victim's filesystem, exfiltrate sensitive data via out-of-band (OOB) HTTP requests, perform SSRF attacks against internal network resources, or cause a denial of service via entity expansion attacks.

EPSS

Процентиль: 27%
0.00095
Низкий

7.1 High

CVSS3

Дефекты

CWE-611