Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-64518

Опубликовано: 10 нояб. 2025
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

The CycloneDX core module provides a model representation of the SBOM along with utilities to assist in creating, validating, and parsing SBOMs. Starting in version 2.1.0 and prior to version 11.0.1, the XML Validator used by cyclonedx-core-java was not configured securely, making the library vulnerable to XML External Entity (XXE) injection. The fix for GHSA-683x-4444-jxh8 / CVE-2024-38374 was incomplete in that it only fixed parsing of XML BOMs, but not validation. The vulnerability has been fixed in cyclonedx-core-java version 11.0.1. As a workaround, applications can reject XML documents before handing them to cyclonedx-core-java for validation. This may be an option if incoming CycloneDX BOMs are known to be in JSON format.

An XML External Entity (XXE) injection vulnerability was found in the CycloneDX Java core library’s XML validation step where the XML Validator was not configured securely. When a specially crafted CycloneDX BOM (XML) is validated, external XML entities can be processed (XXE), allowing an attacker to cause the application to disclose local files or make requests to internal network resources. This can occur when untrusted BOM XML is parsed or validated by the library.

Отчет

The flaw has been rated High severity, because a remote attacker could craft a malicious CycloneDX SBOM that, when validated by an affected system, may result in disclosure of sensitive information from local files or internal network resources. Exploitation does not require authentication or user interaction, but it depends on the application accepting and processing untrusted CycloneDX XML input, the environments that automatically ingest SBOMs from external or untrusted sources.

This issue was introduced in cyclonedx-core-java v2.1.0 via commit https://github.com/CycloneDX/cyclonedx-core-java/commit/162aa594f347b3f612fe0a45071693c3cd398ce9. This vulnerability is related to, but distinct from, the previously fixed CVE-2024-38374, which addressed a similar XML External Entity (XXE) flaw in the SBOM parsing logic. That earlier fix secured the XML parser but did not cover the separate validation process, leaving this secondary XXE path unprotected. This new CVE closes that remaining gap by securing the XML validator used during schema validation.
For rhint-camel-spring-boot-4, the impact is assessed as Low. The vulnerable component (cyclonedx-core-java) is part of the build-time plugin (cyclonedx-maven-plugin) used to generate SBOM metadata. That plugin runs only during the build, and is not included, shipped, or executed at runtime in the delivered product. Consequently, the vulnerability does not affect runtime behavior or security of deployed instances, and cannot be exploited in customer environments.

Меры по смягчению последствий

Reject or block XML-formatted BOMs from untrusted sources before handing them to the library (e.g., require BOMs to be JSON or only accept BOMs from trusted origins).

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Cryostat 4cyclonedx-core-javaNot affected
Red Hat AMQ Clientscyclonedx-core-javaNot affected
Red Hat build of Apache Camel for Spring Boot 4cyclonedx-core-javaFix deferred
Red Hat build of Apache Camel - HawtIO 4cyclonedx-core-javaNot affected
Red Hat build of Apicurio Registry 2cyclonedx-core-javaAffected
Red Hat build of Apicurio Registry 3cyclonedx-core-javaAffected
Red Hat build of Debezium 3cyclonedx-core-javaWill not fix
Red Hat Data Grid 8cyclonedx-core-javaNot affected
Red Hat JBoss Enterprise Application Platform 7cyclonedx-core-javaNot affected
Red Hat JBoss Enterprise Application Platform 8cyclonedx-core-javaNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-611
https://bugzilla.redhat.com/show_bug.cgi?id=2413922cyclonedx-core-java: CycloneDX Core (Java): BOM validation is vulnerable to XML External Entity injection

EPSS

Процентиль: 27%
0.00096
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
5 месяцев назад

The CycloneDX core module provides a model representation of the SBOM along with utilities to assist in creating, validating, and parsing SBOMs. Starting in version 2.1.0 and prior to version 11.0.1, the XML `Validator` used by cyclonedx-core-java was not configured securely, making the library vulnerable to XML External Entity (XXE) injection. The fix for GHSA-683x-4444-jxh8 / CVE-2024-38374 was incomplete in that it only fixed parsing of XML BOMs, but not validation. The vulnerability has been fixed in cyclonedx-core-java version 11.0.1. As a workaround, applications can reject XML documents before handing them to cyclonedx-core-java for validation. This may be an option if incoming CycloneDX BOMs are known to be in JSON format.

CVSS3: 7.5
github
5 месяцев назад

CycloneDX Core (Java): BOM validation is vulnerable to XML External Entity injection

EPSS

Процентиль: 27%
0.00096
Низкий

7.5 High

CVSS3