Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13209: XML External Entity Reference in bestfeng oa_git_free

0
Medium
VulnerabilityCVE-2025-13209cvecve-2025-13209
Published: Sat Nov 15 2025 (11/15/2025, 18:32:06 UTC)
Source: CVE Database V5
Vendor/Project: bestfeng
Product: oa_git_free

Description

A weakness has been identified in bestfeng oa_git_free up to 9.5. This affects the function updateWriteBack of the file yimioa-oa9.5\server\c-flow\src\main\java\com\cloudweb\oa\controller\WorkflowPredefineController.java. This manipulation of the argument writeProp causes xml external entity reference. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 11/22/2025, 20:25:24 UTC

Technical Analysis

CVE-2025-13209 is an XML External Entity (XXE) vulnerability identified in the bestfeng oa_git_free product, specifically affecting versions 9.0 through 9.5. The vulnerability resides in the updateWriteBack function within the WorkflowPredefineController.java source file. This function improperly processes the writeProp argument, allowing an attacker to inject malicious XML entities. When the application parses this crafted XML input, it can be tricked into resolving external entities, which may lead to disclosure of internal files, server-side request forgery (SSRF), or denial of service (DoS) conditions. The vulnerability is remotely exploitable without user interaction and requires only low-level privileges, increasing its risk profile. The CVSS 4.0 base score is 5.3, reflecting medium severity due to limited scope and partial impact on confidentiality, integrity, and availability. Although no official patches or mitigations have been published yet, the public availability of exploit code increases the urgency for defensive measures. The vulnerability does not require authentication, making exposed instances particularly vulnerable to automated scanning and exploitation attempts. The lack of scope change indicates the vulnerability affects only the vulnerable component without impacting other system components. This flaw highlights the importance of secure XML parsing practices, such as disabling external entity resolution and validating input data.

Potential Impact

For European organizations, exploitation of CVE-2025-13209 could result in unauthorized disclosure of sensitive internal files, potentially exposing confidential business data or credentials. Integrity could be compromised if attackers manipulate XML data to alter workflow definitions or configurations, leading to unauthorized process changes. Availability impacts may arise from DoS attacks triggered by malicious XML payloads causing resource exhaustion. Organizations relying on bestfeng oa_git_free for workflow automation or document management could face operational disruptions. Given the remote exploitability without user interaction, attackers could automate attacks at scale, increasing risk to critical infrastructure and enterprises. Data privacy regulations such as GDPR heighten the consequences of data leaks resulting from this vulnerability. The medium severity score suggests moderate but non-trivial risk, warranting prompt mitigation especially in sectors handling sensitive or regulated data.

Mitigation Recommendations

European organizations should immediately audit their deployments of bestfeng oa_git_free to identify affected versions (9.0 to 9.5). Until official patches are released, administrators should implement the following mitigations: 1) Disable XML external entity processing in the Java XML parsers used by the application, typically by setting features such as 'http://apache.org/xml/features/disallow-doctype-decl' to true and disabling external entity resolution. 2) Employ Web Application Firewalls (WAFs) with rules to detect and block XXE attack patterns targeting the updateWriteBack endpoint. 3) Restrict network access to the application to trusted IPs and internal networks to reduce exposure. 4) Monitor logs for suspicious XML payloads or anomalies in workflow update requests. 5) Conduct code reviews and static analysis to identify and remediate unsafe XML parsing practices in custom integrations. 6) Prepare for patch deployment by tracking vendor advisories and testing updates in isolated environments. 7) Educate developers and security teams on secure XML handling best practices to prevent recurrence.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-14T19:00:50.250Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6918d42bcdb3e870ee534ce6

Added to database: 11/15/2025, 7:27:39 PM

Last enriched: 11/22/2025, 8:25:24 PM

Last updated: 1/8/2026, 7:37:12 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats