Skip to main content

CVE-2025-46726: CWE-611: Improper Restriction of XML External Entity Reference in langroid langroid

High
VulnerabilityCVE-2025-46726cvecve-2025-46726cwe-611
Published: Mon May 05 2025 (05/05/2025, 19:21:19 UTC)
Source: CVE
Vendor/Project: langroid
Product: langroid

Description

Langroid is a framework for building large-language-model-powered applications. Prior to version 0.53.4, a LLM application leveraging `XMLToolMessage` class may be exposed to untrusted XML input that could result in DoS and/or exposing local files with sensitive information. Version 0.53.4 fixes the issue.

AI-Powered Analysis

AILast updated: 07/05/2025, 19:28:30 UTC

Technical Analysis

CVE-2025-46726 is a high-severity vulnerability classified under CWE-611, which pertains to Improper Restriction of XML External Entity (XXE) Reference. This vulnerability affects the langroid framework, a platform designed for building applications powered by large language models (LLMs). Specifically, versions of langroid prior to 0.53.4 that utilize the XMLToolMessage class are susceptible. The vulnerability arises when the application processes untrusted XML input without adequately restricting external entity references. This flaw can be exploited remotely without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:N). An attacker can craft malicious XML payloads that, when parsed by the vulnerable XMLToolMessage class, may lead to Denial of Service (DoS) by exhausting system resources or, more critically, disclosure of sensitive local files by leveraging external entity expansion. The vulnerability does not require privileges or user interaction, making it easier to exploit. The CVSS 4.0 base score of 7.8 reflects the high impact on confidentiality and availability, with no impact on integrity. The vulnerability was publicly disclosed on May 5, 2025, and fixed in langroid version 0.53.4. No known exploits are currently reported in the wild, but the potential for exploitation remains significant due to the nature of the flaw and the widespread use of XML parsing in LLM applications built on langroid.

Potential Impact

For European organizations, the impact of CVE-2025-46726 can be substantial, especially those leveraging langroid-based LLM applications for critical business functions such as data analysis, customer interaction, or internal automation. The vulnerability could lead to unauthorized disclosure of sensitive information stored locally on servers, including configuration files, credentials, or proprietary data, thereby compromising confidentiality. Additionally, successful exploitation could cause service disruptions through DoS attacks, affecting availability and potentially leading to operational downtime. Given the increasing adoption of AI and LLM frameworks in sectors like finance, healthcare, and government across Europe, exploitation could result in regulatory compliance violations (e.g., GDPR), reputational damage, and financial losses. The ease of exploitation without authentication increases the risk profile, making it imperative for organizations to address this vulnerability promptly to maintain trust and service continuity.

Mitigation Recommendations

European organizations should immediately upgrade langroid to version 0.53.4 or later, where the vulnerability is patched. For environments where immediate upgrade is not feasible, organizations should implement strict input validation and sanitization to reject or neutralize untrusted XML inputs, particularly those containing external entity declarations. Employ XML parsers configured to disable external entity resolution and DTD processing to prevent XXE attacks. Network-level controls such as web application firewalls (WAFs) can be tuned to detect and block malicious XML payloads exploiting XXE patterns. Additionally, conduct thorough audits of all LLM applications using langroid to identify and remediate instances of XMLToolMessage usage. Regularly monitor logs for anomalous XML parsing errors or access attempts to sensitive local files. Finally, incorporate this vulnerability into incident response plans and ensure staff are aware of the risks associated with XML external entity attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-04-28T20:56:09.084Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdadb4

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/5/2025, 7:28:30 PM

Last updated: 7/26/2025, 9:00:34 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats