CVE-2025-47293: CWE-611: Improper Restriction of XML External Entity Reference in powsybl powsybl-core
PowSyBl (Power System Blocks) is a framework to build power system oriented software. Prior to version 6.7.2, in certain places, powsybl-core XML parsing is vulnerable to an XML external entity (XXE) attack and to a server-side request forgery (SSRF) attack. This allows an attacker to elevate their privileges to read files that they do not have permissions to, including sensitive files on the system. The vulnerable class is com.powsybl.commons.xml.XmlReader which is considered to be untrusted in use cases where untrusted users can submit their XML to the vulnerable methods. This can be a multi-tenant application that hosts many different users perhaps with different privilege levels. This issue has been patched in com.powsybl:powsybl-commons: 6.7.2.
AI Analysis
Technical Summary
CVE-2025-47293 is a security vulnerability identified in the powsybl-core component of the PowSyBl framework, which is used for building power system oriented software. The vulnerability arises from improper restriction of XML External Entity (XXE) references, classified under CWE-611, and also enables Server-Side Request Forgery (SSRF) attacks (CWE-918). Specifically, versions of powsybl-core prior to 6.7.2 contain an insecure XML parser implementation in the class com.powsybl.commons.xml.XmlReader. This parser does not adequately restrict or disable external entity resolution when processing XML input. In environments where untrusted users can submit XML data—such as multi-tenant applications hosting users with varying privilege levels—this flaw can be exploited to read arbitrary files on the server, including sensitive configuration or credential files. The SSRF aspect allows attackers to induce the server to make unauthorized network requests, potentially accessing internal resources not directly reachable by the attacker. The vulnerability does not require authentication or user interaction and can be triggered remotely by submitting crafted XML payloads. The issue was addressed and patched in version 6.7.2 of powsybl-commons. The CVSS v4.0 base score is 2.7, indicating a low severity primarily due to limited impact scope and ease of exploitation without authentication but with low confidentiality impact. No known exploits are currently reported in the wild. The vulnerability affects only versions prior to 6.7.2, so systems running updated versions are not vulnerable.
Potential Impact
For European organizations, especially those involved in power system management, grid simulation, or energy infrastructure software development using PowSyBl, this vulnerability poses a risk of unauthorized data disclosure and potential internal network reconnaissance. Exploitation could lead to leakage of sensitive operational data, configuration files, or credentials, which may facilitate further attacks or disruption of critical energy infrastructure software. Given the multi-tenant use case, attackers could escalate privileges or access data belonging to other tenants, undermining data isolation and confidentiality. While the direct impact on availability or integrity is limited, the exposure of sensitive information could have cascading effects on operational security and compliance with data protection regulations such as GDPR. The SSRF component could also be leveraged to pivot attacks into internal networks, increasing the attack surface. However, the low CVSS score and absence of known exploits suggest the threat is currently limited but should not be underestimated in critical infrastructure contexts.
Mitigation Recommendations
1. Upgrade all instances of powsybl-core and powsybl-commons to version 6.7.2 or later immediately to apply the official patch that disables unsafe XML external entity processing. 2. Implement strict input validation and sanitization on all XML inputs, especially from untrusted or external sources, to prevent malicious payloads. 3. Employ XML parsers configured to disable external entity resolution and DTD processing by default, even beyond the patched version, as a defense-in-depth measure. 4. Restrict network egress from servers running PowSyBl to limit SSRF attack impact, using firewall rules or network segmentation to prevent unauthorized internal resource access. 5. Monitor logs for unusual XML parsing errors or unexpected outbound requests that may indicate exploitation attempts. 6. Conduct regular security audits and penetration testing focusing on XML processing components within power system software. 7. Educate developers and administrators about secure XML handling practices and the risks of XXE and SSRF vulnerabilities in critical infrastructure software.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium
CVE-2025-47293: CWE-611: Improper Restriction of XML External Entity Reference in powsybl powsybl-core
Description
PowSyBl (Power System Blocks) is a framework to build power system oriented software. Prior to version 6.7.2, in certain places, powsybl-core XML parsing is vulnerable to an XML external entity (XXE) attack and to a server-side request forgery (SSRF) attack. This allows an attacker to elevate their privileges to read files that they do not have permissions to, including sensitive files on the system. The vulnerable class is com.powsybl.commons.xml.XmlReader which is considered to be untrusted in use cases where untrusted users can submit their XML to the vulnerable methods. This can be a multi-tenant application that hosts many different users perhaps with different privilege levels. This issue has been patched in com.powsybl:powsybl-commons: 6.7.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-47293 is a security vulnerability identified in the powsybl-core component of the PowSyBl framework, which is used for building power system oriented software. The vulnerability arises from improper restriction of XML External Entity (XXE) references, classified under CWE-611, and also enables Server-Side Request Forgery (SSRF) attacks (CWE-918). Specifically, versions of powsybl-core prior to 6.7.2 contain an insecure XML parser implementation in the class com.powsybl.commons.xml.XmlReader. This parser does not adequately restrict or disable external entity resolution when processing XML input. In environments where untrusted users can submit XML data—such as multi-tenant applications hosting users with varying privilege levels—this flaw can be exploited to read arbitrary files on the server, including sensitive configuration or credential files. The SSRF aspect allows attackers to induce the server to make unauthorized network requests, potentially accessing internal resources not directly reachable by the attacker. The vulnerability does not require authentication or user interaction and can be triggered remotely by submitting crafted XML payloads. The issue was addressed and patched in version 6.7.2 of powsybl-commons. The CVSS v4.0 base score is 2.7, indicating a low severity primarily due to limited impact scope and ease of exploitation without authentication but with low confidentiality impact. No known exploits are currently reported in the wild. The vulnerability affects only versions prior to 6.7.2, so systems running updated versions are not vulnerable.
Potential Impact
For European organizations, especially those involved in power system management, grid simulation, or energy infrastructure software development using PowSyBl, this vulnerability poses a risk of unauthorized data disclosure and potential internal network reconnaissance. Exploitation could lead to leakage of sensitive operational data, configuration files, or credentials, which may facilitate further attacks or disruption of critical energy infrastructure software. Given the multi-tenant use case, attackers could escalate privileges or access data belonging to other tenants, undermining data isolation and confidentiality. While the direct impact on availability or integrity is limited, the exposure of sensitive information could have cascading effects on operational security and compliance with data protection regulations such as GDPR. The SSRF component could also be leveraged to pivot attacks into internal networks, increasing the attack surface. However, the low CVSS score and absence of known exploits suggest the threat is currently limited but should not be underestimated in critical infrastructure contexts.
Mitigation Recommendations
1. Upgrade all instances of powsybl-core and powsybl-commons to version 6.7.2 or later immediately to apply the official patch that disables unsafe XML external entity processing. 2. Implement strict input validation and sanitization on all XML inputs, especially from untrusted or external sources, to prevent malicious payloads. 3. Employ XML parsers configured to disable external entity resolution and DTD processing by default, even beyond the patched version, as a defense-in-depth measure. 4. Restrict network egress from servers running PowSyBl to limit SSRF attack impact, using firewall rules or network segmentation to prevent unauthorized internal resource access. 5. Monitor logs for unusual XML parsing errors or unexpected outbound requests that may indicate exploitation attempts. 6. Conduct regular security audits and penetration testing focusing on XML processing components within power system software. 7. Educate developers and administrators about secure XML handling practices and the risks of XXE and SSRF vulnerabilities in critical infrastructure software.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-05-05T16:53:10.375Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6854854d7ff74dad36a07533
Added to database: 6/19/2025, 9:46:53 PM
Last enriched: 6/19/2025, 10:02:11 PM
Last updated: 8/3/2025, 4:26:45 PM
Views: 17
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.