Skip to main content

CVE-2023-28152: n/a in n/a

Medium
VulnerabilityCVE-2023-28152cvecve-2023-28152
Published: Fri Mar 24 2023 (03/24/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

An issue was discovered in Independentsoft JWord before 1.1.110. The API is prone to XML external entity (XXE) injection via a remote DTD in a DOCX file.

AI-Powered Analysis

AILast updated: 07/08/2025, 15:58:15 UTC

Technical Analysis

CVE-2023-28152 is a medium-severity vulnerability identified in Independentsoft JWord versions prior to 1.1.110. The vulnerability arises from the API's improper handling of XML external entities (XXE) when processing DOCX files. Specifically, the API is susceptible to XXE injection via a remote Document Type Definition (DTD) embedded within a DOCX file. This allows an attacker to craft a malicious DOCX document containing a reference to an external DTD, which the vulnerable parser will fetch and process. Exploiting this flaw can lead to the disclosure of confidential information accessible to the application, as the attacker can manipulate the XML parser to read arbitrary files or resources on the system. The vulnerability is classified under CWE-611 (Improper Restriction of XML External Entity Reference), indicating a failure to properly restrict XML entity processing. The CVSS v3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), but impacts only confidentiality (C:L) without affecting integrity or availability. No known exploits are reported in the wild, and no patches or vendor advisories are currently linked. The lack of vendor and product details limits the scope of direct mitigation guidance, but the vulnerability fundamentally stems from unsafe XML parsing practices in handling DOCX files within the Independentsoft JWord library.

Potential Impact

For European organizations, the impact of CVE-2023-28152 depends largely on the usage of the Independentsoft JWord library within their software stacks, particularly in applications that process DOCX files. If exploited, attackers could gain unauthorized access to sensitive data residing on affected systems by leveraging the XXE flaw to read local files or internal network resources. This can lead to data breaches involving confidential corporate documents, personally identifiable information (PII), or intellectual property. Since the vulnerability does not affect integrity or availability, the primary risk is data confidentiality loss. The ease of exploitation (no privileges or user interaction required) increases the threat level, especially in environments where untrusted DOCX files are processed automatically or with minimal validation. European organizations in sectors such as finance, healthcare, legal, and government, which often handle sensitive documents, could face regulatory consequences under GDPR if data confidentiality is compromised. However, the absence of known active exploitation and the medium severity score suggest the threat is moderate but warrants proactive mitigation to prevent potential data leakage.

Mitigation Recommendations

To mitigate CVE-2023-28152, European organizations should first identify any internal or third-party applications that utilize the Independentsoft JWord library for DOCX processing. If such usage is confirmed, upgrading to version 1.1.110 or later where the vulnerability is fixed is the most effective measure. In the absence of an available patch, organizations should implement strict input validation and sanitization to block or quarantine DOCX files containing external entity references or remote DTDs. Employing XML parsers configured to disable external entity resolution and DTD processing can prevent exploitation. Additionally, sandboxing document processing components and restricting their network access can limit the impact of any attempted XXE attacks. Monitoring logs for unusual XML parsing errors or unexpected outbound network requests during document processing can help detect exploitation attempts. Finally, educating users and administrators about the risks of processing untrusted DOCX files and enforcing strict document handling policies will reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-03-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839d93e182aa0cae2b73023

Added to database: 5/30/2025, 4:13:50 PM

Last enriched: 7/8/2025, 3:58:15 PM

Last updated: 7/30/2025, 12:37:59 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats