Skip to main content

CVE-2025-47293: CWE-611: Improper Restriction of XML External Entity Reference in powsybl powsybl-core

Low
VulnerabilityCVE-2025-47293cvecve-2025-47293cwe-611cwe-918
Published: Thu Jun 19 2025 (06/19/2025, 21:35:40 UTC)
Source: CVE Database V5
Vendor/Project: powsybl
Product: powsybl-core

Description

PowSyBl (Power System Blocks) is a framework to build power system oriented software. Prior to version 6.7.2, in certain places, powsybl-core XML parsing is vulnerable to an XML external entity (XXE) attack and to a server-side request forgery (SSRF) attack. This allows an attacker to elevate their privileges to read files that they do not have permissions to, including sensitive files on the system. The vulnerable class is com.powsybl.commons.xml.XmlReader which is considered to be untrusted in use cases where untrusted users can submit their XML to the vulnerable methods. This can be a multi-tenant application that hosts many different users perhaps with different privilege levels. This issue has been patched in com.powsybl:powsybl-commons: 6.7.2.

AI-Powered Analysis

AILast updated: 06/19/2025, 22:02:11 UTC

Technical Analysis

CVE-2025-47293 is a security vulnerability identified in the powsybl-core component of the PowSyBl framework, which is used for building power system oriented software. The vulnerability arises from improper restriction of XML External Entity (XXE) references, classified under CWE-611, and also enables Server-Side Request Forgery (SSRF) attacks (CWE-918). Specifically, versions of powsybl-core prior to 6.7.2 contain an insecure XML parser implementation in the class com.powsybl.commons.xml.XmlReader. This parser does not adequately restrict or disable external entity resolution when processing XML input. In environments where untrusted users can submit XML data—such as multi-tenant applications hosting users with varying privilege levels—this flaw can be exploited to read arbitrary files on the server, including sensitive configuration or credential files. The SSRF aspect allows attackers to induce the server to make unauthorized network requests, potentially accessing internal resources not directly reachable by the attacker. The vulnerability does not require authentication or user interaction and can be triggered remotely by submitting crafted XML payloads. The issue was addressed and patched in version 6.7.2 of powsybl-commons. The CVSS v4.0 base score is 2.7, indicating a low severity primarily due to limited impact scope and ease of exploitation without authentication but with low confidentiality impact. No known exploits are currently reported in the wild. The vulnerability affects only versions prior to 6.7.2, so systems running updated versions are not vulnerable.

Potential Impact

For European organizations, especially those involved in power system management, grid simulation, or energy infrastructure software development using PowSyBl, this vulnerability poses a risk of unauthorized data disclosure and potential internal network reconnaissance. Exploitation could lead to leakage of sensitive operational data, configuration files, or credentials, which may facilitate further attacks or disruption of critical energy infrastructure software. Given the multi-tenant use case, attackers could escalate privileges or access data belonging to other tenants, undermining data isolation and confidentiality. While the direct impact on availability or integrity is limited, the exposure of sensitive information could have cascading effects on operational security and compliance with data protection regulations such as GDPR. The SSRF component could also be leveraged to pivot attacks into internal networks, increasing the attack surface. However, the low CVSS score and absence of known exploits suggest the threat is currently limited but should not be underestimated in critical infrastructure contexts.

Mitigation Recommendations

1. Upgrade all instances of powsybl-core and powsybl-commons to version 6.7.2 or later immediately to apply the official patch that disables unsafe XML external entity processing. 2. Implement strict input validation and sanitization on all XML inputs, especially from untrusted or external sources, to prevent malicious payloads. 3. Employ XML parsers configured to disable external entity resolution and DTD processing by default, even beyond the patched version, as a defense-in-depth measure. 4. Restrict network egress from servers running PowSyBl to limit SSRF attack impact, using firewall rules or network segmentation to prevent unauthorized internal resource access. 5. Monitor logs for unusual XML parsing errors or unexpected outbound requests that may indicate exploitation attempts. 6. Conduct regular security audits and penetration testing focusing on XML processing components within power system software. 7. Educate developers and administrators about secure XML handling practices and the risks of XXE and SSRF vulnerabilities in critical infrastructure software.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-05-05T16:53:10.375Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6854854d7ff74dad36a07533

Added to database: 6/19/2025, 9:46:53 PM

Last enriched: 6/19/2025, 10:02:11 PM

Last updated: 8/3/2025, 4:26:45 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats