CVE-2014-3574: Improper Input Validation in Apache POI
4.3
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.93126%
CWE
Published
5/17/2022
Updated
4/16/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
AV:N/AC:M/Au:N/C:N/I:N/A:P
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.poi:poi | maven | < 3.10.1 | 3.10.1 |
| org.apache.poi:poi | maven | = 3.11-beta1 | 3.11-beta2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability (CVE-2014-3574) stems from improper XML parsing configuration in Apache POI's OOXML handling. Key evidence includes:
- The vulnerability specifically affects OOXML file processing
- Fix commits (r1615720/r1615731) show changes to XML parser configuration
- Red Hat advisories explicitly mention 'XML Entity Expansion (XEE)' in OOXML contexts
- DocumentHelper.java is POI's central XML parser factory, and historical vulnerabilities (CVE-2014-3529) were fixed here
- Package properties parsing is a common attack surface for OOXML metadata-based exploits These functions lacked critical security settings like FEATURE_SECURE_PROCESSING and entity expansion limits, enabling the XEE attack vector.