CVE-2026-1227
BaseFortify
Publication date: 2026-02-11
Last updated on: 2026-02-11
Assigner: Schneider Electric SE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-611 | The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an XML External Entity (XXE) issue classified as CWE-611. It occurs when a local user uploads a specially crafted TGML graphics file to the EBO server from a workstation. The vulnerability allows improper restriction of XML external entity references, which can lead to unauthorized disclosure of local files, interaction within the EBO system, or denial of service conditions.
How can this vulnerability impact me? :
The impact of this vulnerability includes unauthorized disclosure of local files, which could expose sensitive information. It may also allow an attacker to interact with the EBO system in unintended ways or cause denial of service conditions, potentially disrupting normal operations.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know