Description
A vulnerability was detected in beecue FastBee up to 2.1. Impacted is the function getRootElement of the file springboot/fastbee-server/sip-server/src/main/java/com/fastbee/sip/handler/req/ReqAbstractHandler.java of the component SIP Message Handler. The manipulation results in xml external entity reference. It is possible to launch the attack remotely. A high complexity level is associated with this attack. The exploitability is considered difficult. The project owner replied to the issue report: "Okay, we'll handle it as soon as possible."
Problem types
Externally Controlled Reference
Product status
2.1
Timeline
| 2025-12-29: | Advisory disclosed |
| 2025-12-29: | VulDB entry created |
| 2025-12-29: | VulDB entry last update |
Credits
VulDB Gitee Analyzer
References
vuldb.com/?id.338641 (VDB-338641 | beecue FastBee SIP Message ReqAbstractHandler.java getRootElement xml external entity reference)
vuldb.com/?ctiid.338641 (VDB-338641 | CTI Indicators (IOB, IOC, IOA))
gitee.com/beecue/fastbee/issues/ID7HNZ
gitee.com/beecue/fastbee/issues/ID7HNZ
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.