GHSA-6fhj-vr9j-g45r

Suggest an improvement
Source
https://github.com/advisories/GHSA-6fhj-vr9j-g45r
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/11/GHSA-6fhj-vr9j-g45r/GHSA-6fhj-vr9j-g45r.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-6fhj-vr9j-g45r
Aliases
Published
2025-11-10T21:04:03Z
Modified
2025-11-15T03:09:35.874709Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
CycloneDX Core (Java): BOM validation is vulnerable to XML External Entity injection
Details

Impact

The XML <code>Validator</code> used by cyclonedx-core-java was not configured securely, making the library vulnerable to XML External Entity (XXE) injection.

The fix for GHSA-683x-4444-jxh8 / CVE-2024-38374 has been incomplete in that it only fixed parsing of XML BOMs, but not validation.

Patches

The vulnerability has been fixed in cyclonedx-core-java version 11.0.1.

Workarounds

If feasible, applications can reject XML documents before handing them to cyclonedx-core-java for validation. This may be an option if incoming CycloneDX BOMs are known to be in JSON format.

References

  • The issue was introduced via https://github.com/CycloneDX/cyclonedx-core-java/commit/162aa594f347b3f612fe0a45071693c3cd398ce9
  • The issue was fixed via https://github.com/CycloneDX/cyclonedx-core-java/pull/737
  • https://cheatsheetseries.owasp.org/cheatsheets/XMLExternalEntityPreventionCheat_Sheet.html#schemafactory
Database specific
{
    "github_reviewed": true,
    "severity": "HIGH",
    "cwe_ids": [
        "CWE-611"
    ],
    "nvd_published_at": "2025-11-10T22:15:40Z",
    "github_reviewed_at": "2025-11-10T21:04:03Z"
}
References

Affected packages

Maven / org.cyclonedx:cyclonedx-core-java

Package

Name
org.cyclonedx:cyclonedx-core-java
View open source insights on deps.dev
Purl
pkg:maven/org.cyclonedx/cyclonedx-core-java

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.1.0
Fixed
11.0.1

Affected versions

2.*

2.1.0
2.1.1
2.5.0
2.5.1
2.6.0
2.6.1
2.6.2
2.6.3
2.6.4
2.6.5
2.7.0

3.*

3.0.0
3.0.1
3.0.2
3.0.3
3.0.4
3.0.5
3.0.6
3.0.7
3.0.8

4.*

4.0.0
4.0.1
4.0.2
4.0.3
4.1.0
4.1.1
4.1.2

5.*

5.0.0
5.0.1
5.0.2
5.0.3
5.0.4
5.0.5

6.*

6.0.0

7.*

7.0.0
7.1.0
7.1.1
7.1.2
7.1.3
7.1.4
7.1.5
7.1.6
7.2.0
7.2.1
7.3.0
7.3.1
7.3.2

8.*

8.0.0
8.0.1
8.0.2
8.0.3

9.*

9.0.0
9.0.1
9.0.2
9.0.3
9.0.4
9.0.5
9.1.0

10.*

10.0.0
10.1.0
10.2.1

11.*

11.0.0