The component accepts XML input through the publisher without disabling external entity resolution. This allows malicious actors to submit a crafted XML payload that exploits the unescaped external entity references.
By leveraging this vulnerability, a malicious actor can read confidential files from the product's file system or access limited HTTP resources reachable via HTTP GET requests to the vulnerable product.
By leveraging this vulnerability, a malicious actor can read confidential files from the product's file system or access limited HTTP resources reachable via HTTP GET requests to the vulnerable product.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2026/WSO2-2024-3581/#solution
Workaround
No workaround given by the vendor.
References
History
Thu, 16 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The component accepts XML input through the publisher without disabling external entity resolution. This allows malicious actors to submit a crafted XML payload that exploits the unescaped external entity references. By leveraging this vulnerability, a malicious actor can read confidential files from the product's file system or access limited HTTP resources reachable via HTTP GET requests to the vulnerable product. | |
| Title | XML External Entity Injection via Publisher in WSO2 API Manager Allows Reading Arbitrary Files | |
| First Time appeared |
Wso2
Wso2 wso2 Api Manager |
|
| Weaknesses | CWE-611 | |
| CPEs | cpe:2.3:a:wso2:wso2_api_manager:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wso2
Wso2 wso2 Api Manager |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WSO2
Published:
Updated: 2026-04-16T09:39:20.130Z
Reserved: 2024-08-20T12:45:54.123Z
Link: CVE-2024-8010
No data.
Status : Received
Published: 2026-04-16T10:16:14.050
Modified: 2026-04-16T10:16:14.050
Link: CVE-2024-8010
No data.
OpenCVE Enrichment
No data.
Weaknesses