CVE-2025-34142: CWE-611 Improper Restriction of XML External Entity Reference in ETQ Reliance CG (legacy)
An XML External Entity (XXE) injection vulnerability exists in ETQ Reliance on the CG (legacy) platform within the `/resources/sessions/sso` endpoint. The SAML authentication handler processes XML input without disabling external entity resolution, allowing crafted SAML responses to invoke external entity references. This could enable attackers to retrieve sensitive files or perform server-side request forgery (SSRF). The issue was addressed by disabling external entity processing for the affected XML parser in versions SE.2025.1 and 2025.1.2.
AI Analysis
Technical Summary
CVE-2025-34142 identifies a critical XML External Entity (XXE) vulnerability in the ETQ Reliance CG (legacy) platform, specifically within the SAML authentication handler endpoint /resources/sessions/sso. The vulnerability stems from improper restriction of XML external entity references (CWE-611), where the XML parser processes input without disabling external entity resolution. This allows an attacker to submit a crafted SAML response containing malicious external entity references. Exploitation can lead to unauthorized disclosure of sensitive files on the server, such as configuration or credential files, or enable server-side request forgery (SSRF) attacks that can be used to pivot within internal networks or access restricted resources. The vulnerability affects all versions of ETQ Reliance CG legacy prior to SE.2025.1 and 2025.1.2, where the vendor addressed the issue by disabling external entity processing in the XML parser. The CVSS 4.0 base score of 6.9 reflects a medium severity rating, with an attack vector that is network-based, requiring no privileges or user interaction, but with limited impact on confidentiality and integrity. No public exploits are currently known, but the vulnerability represents a significant risk due to the sensitive nature of SAML authentication processes and the potential for data exfiltration or internal network reconnaissance. Organizations relying on this platform should urgently apply vendor patches and review XML parsing configurations to prevent exploitation.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to sensitive information, including authentication tokens, configuration files, or internal network resources, potentially compromising confidentiality and integrity. Given that ETQ Reliance CG is used in quality, compliance, and risk management workflows, exploitation could disrupt critical business processes and regulatory compliance efforts, especially in sectors like manufacturing, pharmaceuticals, and finance. The SSRF capability could allow attackers to pivot into internal networks, increasing the risk of lateral movement and further compromise. The medium severity rating indicates a moderate but tangible risk, particularly for organizations with exposed or internet-facing SAML endpoints. Failure to remediate could result in data breaches, regulatory penalties under GDPR, and reputational damage. The absence of known exploits in the wild provides a window for proactive defense, but the ease of exploitation without authentication underscores the urgency of mitigation.
Mitigation Recommendations
European organizations should immediately upgrade ETQ Reliance CG legacy installations to versions SE.2025.1 or 2025.1.2 where the vulnerability is patched. In parallel, administrators should disable external entity processing in all XML parsers used within the SAML authentication workflows, ensuring that XML input is securely parsed with entity resolution disabled or sandboxed. Implement strict input validation and schema validation for all SAML responses to detect and reject malformed or unexpected XML content. Network segmentation should be enforced to limit the ability of compromised systems to perform SSRF attacks against internal resources. Monitoring and logging of SAML authentication requests should be enhanced to detect anomalous patterns indicative of exploitation attempts. If patching is delayed, consider deploying Web Application Firewalls (WAFs) with custom rules to block XML payloads containing external entity declarations. Regular security assessments and penetration testing focusing on XML processing components are recommended to identify residual risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-34142: CWE-611 Improper Restriction of XML External Entity Reference in ETQ Reliance CG (legacy)
Description
An XML External Entity (XXE) injection vulnerability exists in ETQ Reliance on the CG (legacy) platform within the `/resources/sessions/sso` endpoint. The SAML authentication handler processes XML input without disabling external entity resolution, allowing crafted SAML responses to invoke external entity references. This could enable attackers to retrieve sensitive files or perform server-side request forgery (SSRF). The issue was addressed by disabling external entity processing for the affected XML parser in versions SE.2025.1 and 2025.1.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-34142 identifies a critical XML External Entity (XXE) vulnerability in the ETQ Reliance CG (legacy) platform, specifically within the SAML authentication handler endpoint /resources/sessions/sso. The vulnerability stems from improper restriction of XML external entity references (CWE-611), where the XML parser processes input without disabling external entity resolution. This allows an attacker to submit a crafted SAML response containing malicious external entity references. Exploitation can lead to unauthorized disclosure of sensitive files on the server, such as configuration or credential files, or enable server-side request forgery (SSRF) attacks that can be used to pivot within internal networks or access restricted resources. The vulnerability affects all versions of ETQ Reliance CG legacy prior to SE.2025.1 and 2025.1.2, where the vendor addressed the issue by disabling external entity processing in the XML parser. The CVSS 4.0 base score of 6.9 reflects a medium severity rating, with an attack vector that is network-based, requiring no privileges or user interaction, but with limited impact on confidentiality and integrity. No public exploits are currently known, but the vulnerability represents a significant risk due to the sensitive nature of SAML authentication processes and the potential for data exfiltration or internal network reconnaissance. Organizations relying on this platform should urgently apply vendor patches and review XML parsing configurations to prevent exploitation.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to sensitive information, including authentication tokens, configuration files, or internal network resources, potentially compromising confidentiality and integrity. Given that ETQ Reliance CG is used in quality, compliance, and risk management workflows, exploitation could disrupt critical business processes and regulatory compliance efforts, especially in sectors like manufacturing, pharmaceuticals, and finance. The SSRF capability could allow attackers to pivot into internal networks, increasing the risk of lateral movement and further compromise. The medium severity rating indicates a moderate but tangible risk, particularly for organizations with exposed or internet-facing SAML endpoints. Failure to remediate could result in data breaches, regulatory penalties under GDPR, and reputational damage. The absence of known exploits in the wild provides a window for proactive defense, but the ease of exploitation without authentication underscores the urgency of mitigation.
Mitigation Recommendations
European organizations should immediately upgrade ETQ Reliance CG legacy installations to versions SE.2025.1 or 2025.1.2 where the vulnerability is patched. In parallel, administrators should disable external entity processing in all XML parsers used within the SAML authentication workflows, ensuring that XML input is securely parsed with entity resolution disabled or sandboxed. Implement strict input validation and schema validation for all SAML responses to detect and reject malformed or unexpected XML content. Network segmentation should be enforced to limit the ability of compromised systems to perform SSRF attacks against internal resources. Monitoring and logging of SAML authentication requests should be enhanced to detect anomalous patterns indicative of exploitation attempts. If patching is delayed, consider deploying Web Application Firewalls (WAFs) with custom rules to block XML payloads containing external entity declarations. Regular security assessments and penetration testing focusing on XML processing components are recommended to identify residual risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.563Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687f881fa83201eaac1c0ec3
Added to database: 7/22/2025, 12:46:23 PM
Last enriched: 11/4/2025, 10:36:53 PM
Last updated: 12/3/2025, 7:25:25 AM
Views: 82
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13486: CWE-94 Improper Control of Generation of Code ('Code Injection') in hwk-fr Advanced Custom Fields: Extended
CriticalCVE-2025-12954: CWE-639 Authorization Bypass Through User-Controlled Key in Timetable and Event Schedule by MotoPress
UnknownCVE-2025-13495: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wpmanageninja FluentCart A New Era of eCommerce – Faster, Lighter, and Simpler
MediumCVE-2025-12585: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in mxchat MxChat – AI Chatbot for WordPress
MediumCVE-2025-10304: CWE-862 Missing Authorization in everestthemes Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.