CVE-2024-52800 – org.verapdf:verapdf-library-arlington
Package
Manager: maven
Name: org.verapdf:verapdf-library-arlington
Vulnerable Version: >=0 <1.26.2
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.0693 pctl0.91032
Details
veraPDF CLI has potential XXE (XML External Entity Injection) vulnerability ### Impact Executing policy checks using custom schematron files via the CLI invokes an XSL transformation that may theoretically lead to a remote code execution (RCE) vulnerability. ### Patches We are currently working on a patch that will be released when ready. ### Workarounds This doesn't affect the standard validation and policy checks functionality, veraPDF's common use cases. Most veraPDF users don't insert any custom XSLT code into policy profiles, which are based on Schematron syntax rather than direct XSL transforms. For users who do, only load custom policy files from sources you trust. ### References Original issue: #1488
Metadata
Created: 2024-12-02T17:15:24Z
Modified: 2025-01-10T13:54:15Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/12/GHSA-4cx5-89vm-833x/GHSA-4cx5-89vm-833x.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-4cx5-89vm-833x
Finding: F083
Auto approve: 1