Skip to main content

CVE-2025-4949: CWE-611 Improper Restriction of XML External Entity Reference in Eclipse JGit Eclipse JGit

Medium
VulnerabilityCVE-2025-4949cvecve-2025-4949cwe-611cwe-827
Published: Wed May 21 2025 (05/21/2025, 06:47:19 UTC)
Source: CVE
Vendor/Project: Eclipse JGit
Product: Eclipse JGit

Description

In Eclipse JGit versions 7.2.0.202503040940-r and older, the ManifestParser class used by the repo command and the AmazonS3 class used to implement the experimental amazons3 git transport protocol allowing to store git pack files in an Amazon S3 bucket, are vulnerable to XML External Entity (XXE) attacks when parsing XML files. This vulnerability can lead to information disclosure, denial of service, and other security issues.

AI-Powered Analysis

AILast updated: 07/06/2025, 04:40:38 UTC

Technical Analysis

CVE-2025-4949 is a security vulnerability identified in Eclipse JGit versions 7.2.0.202503040940-r and earlier. The vulnerability stems from improper restriction of XML External Entity (XXE) references within the ManifestParser class, which is utilized by the 'repo' command, and the AmazonS3 class, which supports an experimental Amazon S3 git transport protocol. This protocol allows git pack files to be stored in Amazon S3 buckets. The vulnerability arises during XML parsing operations where external entity references are not adequately controlled, enabling an attacker to craft malicious XML input that can exploit the XML parser's behavior. Exploitation of this XXE vulnerability can lead to multiple security issues including information disclosure, denial of service (DoS), and potentially other impacts depending on the context of use. Specifically, an attacker could leverage the vulnerability to read arbitrary files from the host system, cause application crashes, or induce resource exhaustion. The vulnerability is classified under CWE-611 (Improper Restriction of XML External Entity Reference) and CWE-827 (Improper Control of Dynamically-Managed Code Resources). The CVSS 4.0 base score is 6.8, indicating a medium severity level. The attack vector is network-based (AV:N), but requires high attack complexity (AC:H), low privileges (PR:L), and user interaction (UI:A). The vulnerability impacts confidentiality primarily, with some impact on availability, and requires that the attacker can induce the vulnerable XML parsing with crafted input. No known exploits are currently reported in the wild, and no patches are linked yet, indicating that mitigation may require updates from the vendor or configuration changes to disable vulnerable features or XML external entity processing.

Potential Impact

For European organizations, this vulnerability poses a moderate risk particularly to those using Eclipse JGit in their development workflows, especially if they utilize the experimental Amazon S3 git transport protocol or the 'repo' command that parses XML manifests. The information disclosure risk could lead to leakage of sensitive internal data or credentials if attackers can exploit the XXE to access local files or internal network resources. Denial of service could disrupt development pipelines or continuous integration systems relying on JGit, impacting operational continuity. Since JGit is widely used in software development environments, organizations with large-scale or distributed development teams, including those in sectors like finance, manufacturing, and government, could face increased exposure. The requirement for user interaction and low privileges reduces the likelihood of widespread automated exploitation but does not eliminate targeted attacks. Additionally, organizations using cloud storage integrations with Amazon S3 for git repositories should be particularly cautious, as this expands the attack surface. The medium severity suggests that while urgent, the threat is not critical, but ignoring it could lead to escalated risks in environments where XML parsing is frequent and trusted.

Mitigation Recommendations

European organizations should take immediate steps to mitigate this vulnerability even before an official patch is released. First, review and restrict the use of the experimental Amazon S3 git transport protocol; consider disabling it if not essential. Second, configure XML parsers used by JGit or related tools to disable external entity processing and DTDs, effectively preventing XXE exploitation. This can often be done by setting secure parser features such as 'disallow-doctype-decl' and disabling external entity resolution. Third, audit and monitor usage of the 'repo' command and any XML manifest files for suspicious or unexpected inputs. Fourth, implement strict access controls and network segmentation to limit exposure of development systems to untrusted users or networks. Fifth, keep an eye on vendor advisories for patches or updates and plan for prompt application once available. Finally, educate developers and DevOps teams about the risks of XXE vulnerabilities and encourage secure coding and configuration practices around XML processing.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
eclipse
Date Reserved
2025-05-19T07:02:22.381Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d7b32c631aa761259c0e0

Added to database: 5/21/2025, 7:05:22 AM

Last enriched: 7/6/2025, 4:40:38 AM

Last updated: 8/11/2025, 2:04:57 AM

Views: 38

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats