CVE-2025-68280
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-05

Last updated on: 2026-01-08

Assigner: Apache Software Foundation

Description
Improper Restriction of XML External Entity Reference vulnerability in Apache SIS. It is possible to write XML files in such a way that, when parsed by Apache SIS, an XML file reveals to the attacker the content of a local file on the server running Apache SIS. This vulnerability impacts the following SIS services: * Reading of GeoTIFF files having the GEO_METADATA tag defined by the Defense Geospatial Information Working Group (DGIWG). * Parsing of ISO 19115 metadata in XML format. * Parsing of Coordinate Reference Systems defined in the GML format. * Parsing of files in GPS Exchange Format (GPX). This issue affects Apache SIS from versions 0.4 through 1.5 inclusive. Users are recommended to upgrade to version 1.6, which will fix the issue. In the meantime, the security vulnerability can be avoided by launching Java with the javax.xml.accessExternalDTD system property sets to a comma-separated list of authorized protocols. For example: java -Djavax.xml.accessExternalDTD="" ...
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-05
Last Modified
2026-01-08
Generated
2026-05-06
AI Q&A
2026-01-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
apache sis From 0.4 (inc) to 1.5 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-611 The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Improper Restriction of XML External Entity (XXE) Reference in Apache SIS. It allows an attacker to craft XML files that, when parsed by Apache SIS, can reveal the content of local files on the server running Apache SIS. This affects several services within Apache SIS that parse XML data, including reading GeoTIFF files with GEO_METADATA tags, parsing ISO 19115 metadata, parsing Coordinate Reference Systems in GML format, and parsing GPS Exchange Format (GPX) files.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized disclosure of sensitive local files on the server running Apache SIS. An attacker can exploit this to access confidential information stored on the server, potentially leading to data breaches or further attacks leveraging the exposed data.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately, you should upgrade Apache SIS to version 1.6 or later, which fixes the issue. If upgrading is not possible right away, you can avoid the vulnerability by launching Java with the system property javax.xml.accessExternalDTD set to a comma-separated list of authorized protocols, for example: java -Djavax.xml.accessExternalDTD="" ...


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart