CVE-2025-49544
BaseFortify
Publication date: 2025-07-08
Last updated on: 2025-07-11
Assigner: Adobe Systems Incorporated
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2025 |
| adobe | coldfusion | 2025 |
| adobe | coldfusion | 2025 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-611 | The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Improper Restriction of XML External Entity Reference (XXE) in ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier. It allows a high-privileged attacker to bypass security features by exploiting how XML external entities are handled, potentially accessing sensitive information without requiring user interaction.
How can this vulnerability impact me? :
The vulnerability can allow a high-privileged attacker to access sensitive information or bypass security measures, which could lead to unauthorized data exposure or compromise of system security.