Home

Description

The CycloneDX core module provides a model representation of the SBOM along with utilities to assist in creating, validating, and parsing SBOMs. Starting in version 2.1.0 and prior to version 11.0.1, the XML `Validator` used by cyclonedx-core-java was not configured securely, making the library vulnerable to XML External Entity (XXE) injection. The fix for GHSA-683x-4444-jxh8 / CVE-2024-38374 was incomplete in that it only fixed parsing of XML BOMs, but not validation. The vulnerability has been fixed in cyclonedx-core-java version 11.0.1. As a workaround, applications can reject XML documents before handing them to cyclonedx-core-java for validation. This may be an option if incoming CycloneDX BOMs are known to be in JSON format.

PUBLISHED Reserved 2025-11-05 | Published 2025-11-10 | Updated 2025-11-12 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-611: Improper Restriction of XML External Entity Reference

Product status

>= 2.1.0, <11.0.1
affected

References

github.com/...e-java/security/advisories/GHSA-6fhj-vr9j-g45r

github.com/CycloneDX/cyclonedx-core-java/pull/737

github.com/...ommit/162aa594f347b3f612fe0a45071693c3cd398ce9

github.com/...ommit/af0ec75c93c03f93733a070c5132554490af5314

cheatsheetseries.owasp.org/...ty_Prevention_Cheat_Sheet.html

cve.org (CVE-2025-64518)

nvd.nist.gov (CVE-2025-64518)

Download JSON