CVE-2025-13209: XML External Entity Reference in bestfeng oa_git_free
A weakness has been identified in bestfeng oa_git_free up to 9.5. This affects the function updateWriteBack of the file yimioa-oa9.5\server\c-flow\src\main\java\com\cloudweb\oa\controller\WorkflowPredefineController.java. This manipulation of the argument writeProp causes xml external entity reference. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-13209 is an XML External Entity (XXE) vulnerability identified in the bestfeng oa_git_free product, specifically affecting versions 9.0 through 9.5. The vulnerability resides in the updateWriteBack function within the WorkflowPredefineController.java source file. This function improperly processes the writeProp argument, allowing an attacker to inject malicious XML entities. When the application parses this crafted XML input, it can be tricked into resolving external entities, which may lead to disclosure of internal files, server-side request forgery (SSRF), or denial of service (DoS) conditions. The vulnerability is remotely exploitable without user interaction and requires only low-level privileges, increasing its risk profile. The CVSS 4.0 base score is 5.3, reflecting medium severity due to limited scope and partial impact on confidentiality, integrity, and availability. Although no official patches or mitigations have been published yet, the public availability of exploit code increases the urgency for defensive measures. The vulnerability does not require authentication, making exposed instances particularly vulnerable to automated scanning and exploitation attempts. The lack of scope change indicates the vulnerability affects only the vulnerable component without impacting other system components. This flaw highlights the importance of secure XML parsing practices, such as disabling external entity resolution and validating input data.
Potential Impact
For European organizations, exploitation of CVE-2025-13209 could result in unauthorized disclosure of sensitive internal files, potentially exposing confidential business data or credentials. Integrity could be compromised if attackers manipulate XML data to alter workflow definitions or configurations, leading to unauthorized process changes. Availability impacts may arise from DoS attacks triggered by malicious XML payloads causing resource exhaustion. Organizations relying on bestfeng oa_git_free for workflow automation or document management could face operational disruptions. Given the remote exploitability without user interaction, attackers could automate attacks at scale, increasing risk to critical infrastructure and enterprises. Data privacy regulations such as GDPR heighten the consequences of data leaks resulting from this vulnerability. The medium severity score suggests moderate but non-trivial risk, warranting prompt mitigation especially in sectors handling sensitive or regulated data.
Mitigation Recommendations
European organizations should immediately audit their deployments of bestfeng oa_git_free to identify affected versions (9.0 to 9.5). Until official patches are released, administrators should implement the following mitigations: 1) Disable XML external entity processing in the Java XML parsers used by the application, typically by setting features such as 'http://apache.org/xml/features/disallow-doctype-decl' to true and disabling external entity resolution. 2) Employ Web Application Firewalls (WAFs) with rules to detect and block XXE attack patterns targeting the updateWriteBack endpoint. 3) Restrict network access to the application to trusted IPs and internal networks to reduce exposure. 4) Monitor logs for suspicious XML payloads or anomalies in workflow update requests. 5) Conduct code reviews and static analysis to identify and remediate unsafe XML parsing practices in custom integrations. 6) Prepare for patch deployment by tracking vendor advisories and testing updates in isolated environments. 7) Educate developers and security teams on secure XML handling best practices to prevent recurrence.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden
CVE-2025-13209: XML External Entity Reference in bestfeng oa_git_free
Description
A weakness has been identified in bestfeng oa_git_free up to 9.5. This affects the function updateWriteBack of the file yimioa-oa9.5\server\c-flow\src\main\java\com\cloudweb\oa\controller\WorkflowPredefineController.java. This manipulation of the argument writeProp causes xml external entity reference. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-13209 is an XML External Entity (XXE) vulnerability identified in the bestfeng oa_git_free product, specifically affecting versions 9.0 through 9.5. The vulnerability resides in the updateWriteBack function within the WorkflowPredefineController.java source file. This function improperly processes the writeProp argument, allowing an attacker to inject malicious XML entities. When the application parses this crafted XML input, it can be tricked into resolving external entities, which may lead to disclosure of internal files, server-side request forgery (SSRF), or denial of service (DoS) conditions. The vulnerability is remotely exploitable without user interaction and requires only low-level privileges, increasing its risk profile. The CVSS 4.0 base score is 5.3, reflecting medium severity due to limited scope and partial impact on confidentiality, integrity, and availability. Although no official patches or mitigations have been published yet, the public availability of exploit code increases the urgency for defensive measures. The vulnerability does not require authentication, making exposed instances particularly vulnerable to automated scanning and exploitation attempts. The lack of scope change indicates the vulnerability affects only the vulnerable component without impacting other system components. This flaw highlights the importance of secure XML parsing practices, such as disabling external entity resolution and validating input data.
Potential Impact
For European organizations, exploitation of CVE-2025-13209 could result in unauthorized disclosure of sensitive internal files, potentially exposing confidential business data or credentials. Integrity could be compromised if attackers manipulate XML data to alter workflow definitions or configurations, leading to unauthorized process changes. Availability impacts may arise from DoS attacks triggered by malicious XML payloads causing resource exhaustion. Organizations relying on bestfeng oa_git_free for workflow automation or document management could face operational disruptions. Given the remote exploitability without user interaction, attackers could automate attacks at scale, increasing risk to critical infrastructure and enterprises. Data privacy regulations such as GDPR heighten the consequences of data leaks resulting from this vulnerability. The medium severity score suggests moderate but non-trivial risk, warranting prompt mitigation especially in sectors handling sensitive or regulated data.
Mitigation Recommendations
European organizations should immediately audit their deployments of bestfeng oa_git_free to identify affected versions (9.0 to 9.5). Until official patches are released, administrators should implement the following mitigations: 1) Disable XML external entity processing in the Java XML parsers used by the application, typically by setting features such as 'http://apache.org/xml/features/disallow-doctype-decl' to true and disabling external entity resolution. 2) Employ Web Application Firewalls (WAFs) with rules to detect and block XXE attack patterns targeting the updateWriteBack endpoint. 3) Restrict network access to the application to trusted IPs and internal networks to reduce exposure. 4) Monitor logs for suspicious XML payloads or anomalies in workflow update requests. 5) Conduct code reviews and static analysis to identify and remediate unsafe XML parsing practices in custom integrations. 6) Prepare for patch deployment by tracking vendor advisories and testing updates in isolated environments. 7) Educate developers and security teams on secure XML handling best practices to prevent recurrence.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-14T19:00:50.250Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6918d42bcdb3e870ee534ce6
Added to database: 11/15/2025, 7:27:39 PM
Last enriched: 11/22/2025, 8:25:24 PM
Last updated: 1/8/2026, 7:37:12 AM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0700: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-13679: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
MediumCVE-2026-0699: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0698: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0697: SQL Injection in code-projects Intern Membership Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.