CRITICAL · 9.1

CVE-2021-23926

The XML parsers used by XMLBeans up to version 2.6.0 did not set the properties needed to protect the user from malicious XML input. Vulnerabilities include possibilities for XML Entity Expansion atta...

Vulnerability Description

The XML parsers used by XMLBeans up to version 2.6.0 did not set the properties needed to protect the user from malicious XML input. Vulnerabilities include possibilities for XML Entity Expansion attacks. Affects XMLBeans up to and including v2.6.0.

CVSS Score

9.1

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
ApacheXmlbeans<= 2.6.0
NetappOncommand Unified Manager Core Package-
NetappSnap Creator Framework-
NetappSnapmanager-
DebianDebian Linux9.0
OracleMiddleware Common Libraries And Tools12.2.1.3.0
OraclePeoplesoft Enterprise Peopletools8.57

Related Weaknesses (CWE)

References

FAQ

What is CVE-2021-23926?

CVE-2021-23926 is a vulnerability with a CVSS score of 9.1 (CRITICAL). The XML parsers used by XMLBeans up to version 2.6.0 did not set the properties needed to protect the user from malicious XML input. Vulnerabilities include possibilities for XML Entity Expansion atta...

How severe is CVE-2021-23926?

CVE-2021-23926 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2021-23926?

Check the references section above for vendor advisories and patch information. Affected products include: Apache Xmlbeans, Netapp Oncommand Unified Manager Core Package, Netapp Snap Creator Framework, Netapp Snapmanager, Debian Debian Linux.