Ghostwire

CVE-2024-8010: The component accepts XML input through the publisher without disabling external entity resolution. This allows...

LOW CVSS 3.5 EPSS 0.01%

Published: April 16, 2026 | Last Modified: April 16, 2026

Description

The component accepts XML input through the publisher without disabling external entity resolution. This allows malicious actors to submit a crafted XML payload that exploits the unescaped external entity references. By leveraging this vulnerability, a malicious actor can read confidential files from the product's file system or access limited HTTP resources reachable via HTTP GET requests to the vulnerable product.

Ghostwire Analysis — What This Means Practically

Exploitation Probability (EPSS): Low — 0.01% (3th percentile)

Low exploitation probability based on current threat landscape data. Standard patching timeline is appropriate.

This analysis is generated by Ghostwire from NVD, CISA KEV, EPSS, and open-source intelligence data. Verify findings through primary sources before acting.

Security Coverage (1 articles)

References