Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34142: CWE-611 Improper Restriction of XML External Entity Reference in ETQ Reliance CG (legacy)

0
Medium
VulnerabilityCVE-2025-34142cvecve-2025-34142cwe-611
Published: Tue Jul 22 2025 (07/22/2025, 12:31:58 UTC)
Source: CVE Database V5
Vendor/Project: ETQ
Product: Reliance CG (legacy)

Description

An XML External Entity (XXE) injection vulnerability exists in ETQ Reliance on the CG (legacy) platform within the `/resources/sessions/sso` endpoint. The SAML authentication handler processes XML input without disabling external entity resolution, allowing crafted SAML responses to invoke external entity references. This could enable attackers to retrieve sensitive files or perform server-side request forgery (SSRF). The issue was addressed by disabling external entity processing for the affected XML parser in versions SE.2025.1 and 2025.1.2.

AI-Powered Analysis

AILast updated: 11/04/2025, 22:36:53 UTC

Technical Analysis

CVE-2025-34142 identifies a critical XML External Entity (XXE) vulnerability in the ETQ Reliance CG (legacy) platform, specifically within the SAML authentication handler endpoint /resources/sessions/sso. The vulnerability stems from improper restriction of XML external entity references (CWE-611), where the XML parser processes input without disabling external entity resolution. This allows an attacker to submit a crafted SAML response containing malicious external entity references. Exploitation can lead to unauthorized disclosure of sensitive files on the server, such as configuration or credential files, or enable server-side request forgery (SSRF) attacks that can be used to pivot within internal networks or access restricted resources. The vulnerability affects all versions of ETQ Reliance CG legacy prior to SE.2025.1 and 2025.1.2, where the vendor addressed the issue by disabling external entity processing in the XML parser. The CVSS 4.0 base score of 6.9 reflects a medium severity rating, with an attack vector that is network-based, requiring no privileges or user interaction, but with limited impact on confidentiality and integrity. No public exploits are currently known, but the vulnerability represents a significant risk due to the sensitive nature of SAML authentication processes and the potential for data exfiltration or internal network reconnaissance. Organizations relying on this platform should urgently apply vendor patches and review XML parsing configurations to prevent exploitation.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized access to sensitive information, including authentication tokens, configuration files, or internal network resources, potentially compromising confidentiality and integrity. Given that ETQ Reliance CG is used in quality, compliance, and risk management workflows, exploitation could disrupt critical business processes and regulatory compliance efforts, especially in sectors like manufacturing, pharmaceuticals, and finance. The SSRF capability could allow attackers to pivot into internal networks, increasing the risk of lateral movement and further compromise. The medium severity rating indicates a moderate but tangible risk, particularly for organizations with exposed or internet-facing SAML endpoints. Failure to remediate could result in data breaches, regulatory penalties under GDPR, and reputational damage. The absence of known exploits in the wild provides a window for proactive defense, but the ease of exploitation without authentication underscores the urgency of mitigation.

Mitigation Recommendations

European organizations should immediately upgrade ETQ Reliance CG legacy installations to versions SE.2025.1 or 2025.1.2 where the vulnerability is patched. In parallel, administrators should disable external entity processing in all XML parsers used within the SAML authentication workflows, ensuring that XML input is securely parsed with entity resolution disabled or sandboxed. Implement strict input validation and schema validation for all SAML responses to detect and reject malformed or unexpected XML content. Network segmentation should be enforced to limit the ability of compromised systems to perform SSRF attacks against internal resources. Monitoring and logging of SAML authentication requests should be enhanced to detect anomalous patterns indicative of exploitation attempts. If patching is delayed, consider deploying Web Application Firewalls (WAFs) with custom rules to block XML payloads containing external entity declarations. Regular security assessments and penetration testing focusing on XML processing components are recommended to identify residual risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.563Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687f881fa83201eaac1c0ec3

Added to database: 7/22/2025, 12:46:23 PM

Last enriched: 11/4/2025, 10:36:53 PM

Last updated: 12/3/2025, 7:25:25 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats