CVE-2025-6438
Awaiting Analysis
Awaiting Analysis - Queue
BaseFortify
Publication date: 2025-07-11
Last updated on: 2025-11-03
Assigner: Schneider Electric SE
Description
Description
A
CWE-611: Improper Restriction of XML External Entity Reference vulnerability exists that could
cause manipulation of SOAP API calls and XML external entities injection resulting in unauthorized file access
when the server is accessed via the network using an application account.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-611 | The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an XML External Entity (XXE) injection issue (CWE-611) that allows manipulation of SOAP API calls and injection of XML external entities. It can lead to unauthorized file access on the server when accessed over the network using an application account.
How can this vulnerability impact me? :
The vulnerability can result in unauthorized access to files on the affected server, potentially exposing sensitive information or enabling further attacks through manipulation of SOAP API calls.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70