-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from insecure XML parsing in Zend_XmlRpc components using PHP's SimpleXMLElement without disabling external entity loading. The security advisory explicitly mentions patching by adding libxml_disable_entity_loader() before SimpleXML object creation. The Request and Response handlers in Zend_XmlRpc are the primary XML processing components, making their XML loading methods the vulnerable entry points. The functions are identified based on the described attack vector (XML-RPC request processing) and the documented mitigation strategy.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| zendframework/zendframework1 | composer | >= 1.0.0, < 1.11.13 | 1.11.13 |
KEV Misses 88% of Exploited CVEs- Get the report