Vulnerability Description
Docling's METS GBS backend is vulnerable to XML Entity Expansion (XXE) attacks thru 2.61.0. The backend extracts and validates XML files from .tar.gz archives using etree.fromstring() without disabling entity resolution. An attacker can craft a malicious XML file with nested entity definitions (XML Bomb) and package it into a .tar.gz archive. When processed by Docling, the exponential expansion of entities during XML parsing leads to excessive resource consumption, resulting in a denial of service (DoS) condition on the system running the Docling parser.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/docling-project/docling
- https://www.notion.so/CVE-2026-31248-35d1e1393188818585b2ce3b9ce24686
FAQ
What is CVE-2026-31248?
CVE-2026-31248 is a vulnerability with a CVSS score of 7.5 (HIGH). Docling's METS GBS backend is vulnerable to XML Entity Expansion (XXE) attacks thru 2.61.0. The backend extracts and validates XML files from .tar.gz archives using etree.fromstring() without disablin...
How severe is CVE-2026-31248?
CVE-2026-31248 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-31248?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.