logo

CVE-2025-47293 com.powsybl:powsybl-commons

Package

Manager: maven
Name: com.powsybl:powsybl-commons
Vulnerable Version: >=0 <6.7.2

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U

EPSS: 0.0008 pctl0.24333

Details

PowSyBl Core XML Reader allows XXE and SSRF ### Impact _What kind of vulnerability is it? Who is impacted?_ In certain places, powsybl-core XML parsing is vulnerable to an XXE attack and in on place also to an SSRF attack. This allows an attacker to elevate their privileges to read files that they do not have permissions to, including sensitive files on the system. The vulnerable class is `com.powsybl.commons.xml.XmlReader` which is considered to be untrusted in use cases where untrusted users can submit their XML to the vulnerable methods. This can be a multi-tenant application that hosts many different users perhaps with different privilege levels. #### Am I impacted? You are vulnerable if you allow untrusted users to import untrusted CGMES or XIIDM network files. ### Patches com.powsybl:powsybl-commons:6.7.2 and higher ### References [powsybl-core v6.7.2](https://github.com/powsybl/powsybl-core/releases/tag/v6.7.2)

Metadata

Created: 2025-06-19T14:29:40Z
Modified: 2025-06-20T14:19:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-qpj9-qcwx-8jv2/GHSA-qpj9-qcwx-8jv2.json
CWE IDs: ["CWE-611", "CWE-918"]
Alternative ID: GHSA-qpj9-qcwx-8jv2
Finding: F083
Auto approve: 1