Property
Languagejavascript
Severitymedium
CWECWE-611: Improper Restriction of XML External Entity Reference
OWASPA04:2017 - XML External Entities (XXE)
Confidence LevelLow
Impact LevelHigh
Likelihood LevelLow

Description#

The parseXml() function is being used with the ’noent’ option set to true, which allows external entities in XML to be processed. If untrusted or user-supplied XML data is parsed this way, it can expose the application to XML External Entity (XXE) attacks.

Impact#

An attacker could exploit this to read sensitive files from the server, perform server-side request forgery (SSRF), or execute denial-of-service attacks. This could lead to data breaches, exposure of confidential information, or compromise of internal systems.