CVE-2024-28109 – org.verapdf:verapdf-library
Package
Manager: maven
Name: org.verapdf:verapdf-library
Vulnerable Version: >=0 <1.24.2
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.02236 pctl0.83906
Details
veraPDF has potential XSLT injection vulnerability when using policy files ### Impact Executing policy checks using custom schematron files invokes an XSL transformation that may theoretically lead to a remote code execution (RCE) vulnerability. ### Patches This has been patched and users should upgrade to veraPDF v1.24.2 ### Workarounds This doesn't affect the standard validation and policy checks functionality, veraPDF's common use cases. Most veraPDF users don't insert any custom XSLT code into policy profiles, which are based on Schematron syntax rather than direct XSL transforms. For users who do, only load custom policy files from sources you trust. ### References Original issue: <https://github.com/veraPDF/veraPDF-library/issues/1415>
Metadata
Created: 2024-05-20T14:57:07Z
Modified: 2025-01-17T16:26:35Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-qxqf-2mfx-x8jw/GHSA-qxqf-2mfx-x8jw.json
CWE IDs: ["CWE-91"]
Alternative ID: GHSA-qxqf-2mfx-x8jw
Finding: F021
Auto approve: 1