Skip to main content

CVE-2023-28150: n/a in n/a

Medium
VulnerabilityCVE-2023-28150cvecve-2023-28150
Published: Fri Mar 24 2023 (03/24/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

An issue was discovered in Independentsoft JODF before 1.1.110. The API is prone to XML external entity (XXE) injection via a remote DTD in a DOCX file.

AI-Powered Analysis

AILast updated: 07/08/2025, 15:57:38 UTC

Technical Analysis

CVE-2023-28150 is a medium-severity vulnerability identified in Independentsoft JODF versions prior to 1.1.110. The vulnerability arises from improper handling of XML external entities (XXE) within the processing of DOCX files. Specifically, the API is susceptible to XXE injection via a remote Document Type Definition (DTD) embedded in a DOCX file. This means that when the vulnerable API parses a crafted DOCX document containing a malicious external entity reference, it may fetch and process external resources defined in the remote DTD. Such behavior can lead to information disclosure, as the XML parser may access local or remote files or resources that should not be exposed. The vulnerability is classified under CWE-611 (Improper Restriction of XML External Entity Reference), a common XML parsing security flaw. The CVSS v3.1 base score is 5.3, indicating a medium severity level. The vector string (CVSS:3.1/AC:L/AV:N/A:N/C:L/I:N/PR:N/S:U/UI:N) shows that the attack requires no privileges, no user interaction, and can be executed remotely over the network without authentication, but only impacts confidentiality with no effect on integrity or availability. No known exploits have been reported in the wild, and no official patches or vendor advisories are currently linked. The vulnerability affects the XML parsing component of the Independentsoft JODF library, which is used for handling DOCX files programmatically, often in document processing or conversion applications. Attackers could exploit this by delivering malicious DOCX files to systems using the vulnerable API, potentially leading to unauthorized disclosure of sensitive information accessible to the XML parser context.

Potential Impact

For European organizations, the impact of CVE-2023-28150 depends largely on the extent to which Independentsoft JODF is integrated into their document processing workflows. Organizations that automate DOCX file handling—such as legal firms, financial institutions, government agencies, and enterprises dealing with large volumes of documents—may be at risk if they use vulnerable versions of this library. The vulnerability could allow attackers to exfiltrate sensitive configuration files, credentials, or other confidential data accessible to the XML parser environment. Although the vulnerability does not affect system integrity or availability, the confidentiality breach could lead to data leaks, regulatory non-compliance (e.g., GDPR violations), and reputational damage. Since exploitation requires no authentication or user interaction, attackers could potentially weaponize malicious DOCX files delivered via email or file upload portals. However, the lack of known active exploits and the medium severity score suggest a moderate risk level. Organizations with strong perimeter defenses and secure file handling policies may mitigate exposure, but those with automated document ingestion pipelines should prioritize assessment and remediation.

Mitigation Recommendations

To mitigate CVE-2023-28150, European organizations should: 1) Identify and inventory all applications and services using Independentsoft JODF for DOCX processing. 2) Upgrade to Independentsoft JODF version 1.1.110 or later, where the vulnerability is fixed. If an upgrade is not immediately possible, implement temporary mitigations such as disabling external entity resolution in XML parsers if configurable. 3) Employ strict input validation and sandboxing for DOCX files, including scanning for malicious content before processing. 4) Implement network egress filtering to prevent unauthorized outbound connections initiated by XML parsers resolving external entities. 5) Monitor logs for unusual XML parsing activity or unexpected network requests triggered by document processing. 6) Educate users and administrators about the risks of opening or processing untrusted DOCX files, especially those received from external sources. 7) Integrate document processing into secure workflows that isolate parsing operations from sensitive environments. These targeted steps go beyond generic advice by focusing on the specific XML parsing context and the nature of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-03-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839d93e182aa0cae2b7301f

Added to database: 5/30/2025, 4:13:50 PM

Last enriched: 7/8/2025, 3:57:38 PM

Last updated: 8/1/2025, 12:11:00 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats