CVE-2012-5657: Zend Framework XXE Vulnerability
5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.71532%
CWE
Published
5/17/2022
Updated
1/12/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:P/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
zendframework/zendframework1 | composer | < 1.11.15 | 1.11.15 |
zendframework/zendframework1 | composer | >= 1.12.0-rc1, < 1.12.1 | 1.12.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure XML parsing in Zend_Feed components. The commit patches show that both Zend_Feed::importString and Zend_Feed_Abstract's constructor were modified to add libxml_disable_entity_loader protections. Prior to the fix, these functions parsed XML (via DOMDocument::loadXML) without disabling external entity resolution, allowing attackers to inject malicious entities. The vulnerable code paths are directly in the XML processing methods before entity loader hardening was implemented.