Home

Description

OpenRemote is an open-source internet-of-things platform. Prior to version 1.22.0, the Velbus asset import path parses attacker-controlled XML without explicit XXE hardening. An authenticated user who can call the import endpoint may trigger XML external entity processing, which can lead to server-side file disclosure and SSRF. The target file must be less than 1023 characters. Version 1.22.0 fixes the issue.

PUBLISHED Reserved 2026-04-15 | Published 2026-04-22 | Updated 2026-04-23 | Assigner GitHub_M




HIGH: 7.6CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L

Problem types

CWE-611: Improper Restriction of XML External Entity Reference

Product status

< 1.22.0
affected

References

github.com/...remote/security/advisories/GHSA-g24f-mgc3-jwwc exploit

github.com/...remote/security/advisories/GHSA-g24f-mgc3-jwwc

cve.org (CVE-2026-40882)

nvd.nist.gov (CVE-2026-40882)

Download JSON