CVE-2025-14543: CWE-611 Improper Restriction of XML External Entity Reference in RTI Connext Professional
CVE-2025-14543 is a high-severity vulnerability in RTI Connext Professional affecting multiple versions prior to 7. 7. 0 and other earlier releases. It involves improper restriction of XML External Entity (XXE) references, allowing serialized data external linking. The vulnerability has a CVSS 4. 0 base score of 8. 8, indicating a network attack vector with no required privileges or user interaction, and high impact on confidentiality and availability. No official patch or remediation guidance is currently provided by the vendor. There are no known exploits in the wild at this time. Users of affected versions should monitor vendor advisories for updates and apply fixes once available.
AI Analysis
Technical Summary
CVE-2025-14543 is an XML External Entity (XXE) vulnerability (CWE-611) in RTI Connext Professional Core Libraries. It affects versions from 4.3x up to but not including 7.7.0, allowing serialized data external linking due to improper restriction of XML external entity references. The vulnerability can be exploited remotely without authentication or user interaction, resulting in high confidentiality and availability impacts. The CVSS 4.0 vector indicates network attack complexity is low and no privileges are required. No official remediation or patch information is currently available from the vendor. This vulnerability requires attention due to its high severity and broad version impact.
Potential Impact
The vulnerability allows an attacker to exploit improper XML external entity processing to link external serialized data, potentially leading to unauthorized disclosure of information and disruption of service. The CVSS score of 8.8 reflects high impact on confidentiality and availability with no required privileges or user interaction. There are no known exploits in the wild currently, but the vulnerability affects multiple widely used versions of Connext Professional.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no official fix or remediation level is provided, users should monitor RTI's advisories closely. Until a patch is available, consider restricting XML input sources or disabling external entity processing if configurable in the affected product versions.
CVE-2025-14543: CWE-611 Improper Restriction of XML External Entity Reference in RTI Connext Professional
Description
CVE-2025-14543 is a high-severity vulnerability in RTI Connext Professional affecting multiple versions prior to 7. 7. 0 and other earlier releases. It involves improper restriction of XML External Entity (XXE) references, allowing serialized data external linking. The vulnerability has a CVSS 4. 0 base score of 8. 8, indicating a network attack vector with no required privileges or user interaction, and high impact on confidentiality and availability. No official patch or remediation guidance is currently provided by the vendor. There are no known exploits in the wild at this time. Users of affected versions should monitor vendor advisories for updates and apply fixes once available.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-14543 is an XML External Entity (XXE) vulnerability (CWE-611) in RTI Connext Professional Core Libraries. It affects versions from 4.3x up to but not including 7.7.0, allowing serialized data external linking due to improper restriction of XML external entity references. The vulnerability can be exploited remotely without authentication or user interaction, resulting in high confidentiality and availability impacts. The CVSS 4.0 vector indicates network attack complexity is low and no privileges are required. No official remediation or patch information is currently available from the vendor. This vulnerability requires attention due to its high severity and broad version impact.
Potential Impact
The vulnerability allows an attacker to exploit improper XML external entity processing to link external serialized data, potentially leading to unauthorized disclosure of information and disruption of service. The CVSS score of 8.8 reflects high impact on confidentiality and availability with no required privileges or user interaction. There are no known exploits in the wild currently, but the vulnerability affects multiple widely used versions of Connext Professional.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no official fix or remediation level is provided, users should monitor RTI's advisories closely. Until a patch is available, consider restricting XML input sources or disabling external entity processing if configurable in the affected product versions.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- RTI
- Date Reserved
- 2025-12-11T15:00:13.943Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69f376fbcbff5d86103580ca
Added to database: 4/30/2026, 3:36:27 PM
Last enriched: 4/30/2026, 3:51:47 PM
Last updated: 4/30/2026, 11:11:28 PM
Views: 155
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.