CVE-2023-45139: CWE-611: Improper Restriction of XML External Entity Reference in fonttools fonttools
fontTools is a library for manipulating fonts, written in Python. The subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system. This vulnerability has been patched in version 4.43.0.
AI Analysis
Technical Summary
CVE-2023-45139 is a high-severity vulnerability classified under CWE-611, which pertains to improper restriction of XML external entity (XXE) references. This vulnerability affects the fontTools library, a widely used Python library for font manipulation. Specifically, the subsetting module of fontTools, when processing candidate fonts that include OT-SVG fonts containing an SVG table, is vulnerable to XXE injection. An attacker can craft a malicious SVG table within a font file that, when parsed by a vulnerable version of fontTools (versions >= 4.28.2 and < 4.43.0), triggers the XML parser to resolve arbitrary external entities. This can lead to unauthorized disclosure of local files on the host filesystem or the ability to make arbitrary web requests from the host system. The vulnerability does not require any authentication or user interaction and can be exploited remotely if the fontTools library processes untrusted font files. The vulnerability has been patched in version 4.43.0 of fontTools. The CVSS v3.1 base score is 7.5, indicating a high severity, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, meaning it is remotely exploitable over the network without privileges or user interaction, impacts confidentiality severely, but does not affect integrity or availability. No known exploits are currently reported in the wild, but the potential for sensitive data exposure or server-side request forgery (SSRF)-like behavior exists due to the ability to make web requests from the host.
Potential Impact
For European organizations, the impact of CVE-2023-45139 can be significant, especially for those relying on fontTools in their software development, font processing pipelines, or document rendering services. The vulnerability could lead to unauthorized disclosure of sensitive internal files, such as configuration files, credentials, or proprietary data, if malicious fonts are processed. Additionally, the ability to make arbitrary web requests from the host could be leveraged to pivot attacks within internal networks or exfiltrate data covertly. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, could face compliance risks under GDPR if sensitive data is leaked. The lack of required authentication and user interaction increases the risk of automated exploitation, particularly in environments where fontTools processes fonts from untrusted sources or user uploads. Although no exploits are currently known in the wild, the high CVSS score and ease of exploitation warrant immediate attention to prevent potential attacks.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Immediately upgrade all instances of fontTools to version 4.43.0 or later to ensure the vulnerability is patched. 2) Audit all internal and third-party applications and services that use fontTools to identify vulnerable versions and update them accordingly. 3) Implement strict input validation and sanitization for any font files processed, especially those originating from untrusted or external sources. 4) Employ sandboxing or containerization for font processing tasks to limit the potential impact of exploitation, restricting file system and network access. 5) Monitor logs for unusual file access patterns or unexpected outbound network requests from systems running fontTools. 6) Review and tighten network egress controls to prevent unauthorized external web requests initiated by exploited hosts. 7) Educate development and security teams about the risks of XXE vulnerabilities and encourage secure coding practices when handling XML parsing. These measures go beyond generic advice by focusing on patching, environment hardening, and proactive monitoring tailored to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2023-45139: CWE-611: Improper Restriction of XML External Entity Reference in fonttools fonttools
Description
fontTools is a library for manipulating fonts, written in Python. The subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system. This vulnerability has been patched in version 4.43.0.
AI-Powered Analysis
Technical Analysis
CVE-2023-45139 is a high-severity vulnerability classified under CWE-611, which pertains to improper restriction of XML external entity (XXE) references. This vulnerability affects the fontTools library, a widely used Python library for font manipulation. Specifically, the subsetting module of fontTools, when processing candidate fonts that include OT-SVG fonts containing an SVG table, is vulnerable to XXE injection. An attacker can craft a malicious SVG table within a font file that, when parsed by a vulnerable version of fontTools (versions >= 4.28.2 and < 4.43.0), triggers the XML parser to resolve arbitrary external entities. This can lead to unauthorized disclosure of local files on the host filesystem or the ability to make arbitrary web requests from the host system. The vulnerability does not require any authentication or user interaction and can be exploited remotely if the fontTools library processes untrusted font files. The vulnerability has been patched in version 4.43.0 of fontTools. The CVSS v3.1 base score is 7.5, indicating a high severity, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, meaning it is remotely exploitable over the network without privileges or user interaction, impacts confidentiality severely, but does not affect integrity or availability. No known exploits are currently reported in the wild, but the potential for sensitive data exposure or server-side request forgery (SSRF)-like behavior exists due to the ability to make web requests from the host.
Potential Impact
For European organizations, the impact of CVE-2023-45139 can be significant, especially for those relying on fontTools in their software development, font processing pipelines, or document rendering services. The vulnerability could lead to unauthorized disclosure of sensitive internal files, such as configuration files, credentials, or proprietary data, if malicious fonts are processed. Additionally, the ability to make arbitrary web requests from the host could be leveraged to pivot attacks within internal networks or exfiltrate data covertly. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, could face compliance risks under GDPR if sensitive data is leaked. The lack of required authentication and user interaction increases the risk of automated exploitation, particularly in environments where fontTools processes fonts from untrusted sources or user uploads. Although no exploits are currently known in the wild, the high CVSS score and ease of exploitation warrant immediate attention to prevent potential attacks.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Immediately upgrade all instances of fontTools to version 4.43.0 or later to ensure the vulnerability is patched. 2) Audit all internal and third-party applications and services that use fontTools to identify vulnerable versions and update them accordingly. 3) Implement strict input validation and sanitization for any font files processed, especially those originating from untrusted or external sources. 4) Employ sandboxing or containerization for font processing tasks to limit the potential impact of exploitation, restricting file system and network access. 5) Monitor logs for unusual file access patterns or unexpected outbound network requests from systems running fontTools. 6) Review and tighten network egress controls to prevent unauthorized external web requests initiated by exploited hosts. 7) Educate development and security teams about the risks of XXE vulnerabilities and encourage secure coding practices when handling XML parsing. These measures go beyond generic advice by focusing on patching, environment hardening, and proactive monitoring tailored to the nature of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2023-10-04T16:02:46.329Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0a31182aa0cae27f6eb9
Added to database: 6/3/2025, 2:44:01 PM
Last enriched: 7/4/2025, 10:27:59 AM
Last updated: 8/13/2025, 8:02:35 PM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.