logo

CVE-2024-52800 org.verapdf:core

Package

Manager: maven
Name: org.verapdf:core
Vulnerable Version: >=0 <1.26.2

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.0693 pctl0.91039

Details

veraPDF CLI has potential XXE (XML External Entity Injection) vulnerability ### Impact Executing policy checks using custom schematron files via the CLI invokes an XSL transformation that may theoretically lead to a remote code execution (RCE) vulnerability. ### Patches We are currently working on a patch that will be released when ready. ### Workarounds This doesn't affect the standard validation and policy checks functionality, veraPDF's common use cases. Most veraPDF users don't insert any custom XSLT code into policy profiles, which are based on Schematron syntax rather than direct XSL transforms. For users who do, only load custom policy files from sources you trust. ### References Original issue: #1488

Metadata

Created: 2024-12-02T17:15:24Z
Modified: 2025-01-10T13:54:15Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/12/GHSA-4cx5-89vm-833x/GHSA-4cx5-89vm-833x.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-4cx5-89vm-833x
Finding: F083
Auto approve: 1