CVE-2020-26705:
XML External Entity vulnerability in Easy-XML
9.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.54837%
CWE
Published
11/1/2021
Updated
11/18/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
easy-xml | pip | <= 0.5.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly identifies parseXML
as the vulnerable function across all sources (CVE, GHSA, PyPA advisory). XXE vulnerabilities typically occur when XML parsers resolve external entities by default. The function's name and role in processing XML input align directly with the described attack vector. While the exact file path isn't explicitly documented, the package's naming convention suggests it would reside in easy_xml.py
.