CVE-2025-5877: XML External Entity Reference in Fengoffice Feng Office
A vulnerability, which was classified as problematic, has been found in Fengoffice Feng Office 3.2.2.1. Affected by this issue is some unknown functionality of the file /application/models/ApplicationDataObject.class.php of the component Document Upload Handler. The manipulation leads to xml external entity reference. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-5877 is a security vulnerability identified in Fengoffice Feng Office version 3.2.2.1, specifically within the Document Upload Handler component, located in the file /application/models/ApplicationDataObject.class.php. The vulnerability is classified as an XML External Entity (XXE) reference issue. XXE vulnerabilities occur when an application parses XML input containing references to external entities, which can be exploited by attackers to read arbitrary files, perform server-side request forgery (SSRF), or cause denial of service (DoS) conditions. In this case, the vulnerability allows remote attackers to manipulate XML input to trigger external entity references without requiring user interaction or authentication, as indicated by the CVSS vector. The vulnerability has been publicly disclosed, and although no known exploits are currently reported in the wild, the public disclosure increases the risk of exploitation attempts. The vendor has not responded to the disclosure, and no patches or mitigations have been provided yet. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the vulnerability's moderate impact on confidentiality, integrity, and availability, with low complexity and no required privileges or user interaction. The vulnerability affects a widely used collaboration and project management platform, which may be deployed in various organizational environments.
Potential Impact
For European organizations using Fengoffice Feng Office 3.2.2.1, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized disclosure of sensitive internal files or data through XXE attacks, potentially exposing confidential business information or user data. Additionally, attackers might leverage the vulnerability to perform SSRF attacks, which could be used to pivot within internal networks, access internal services, or disrupt availability. Given that Fengoffice is used for project management and collaboration, compromise could affect business continuity and data integrity. The lack of vendor response and absence of patches increases the window of exposure. Organizations in sectors with strict data protection regulations, such as GDPR in Europe, could face compliance risks and reputational damage if sensitive data is leaked. The medium severity indicates that while the vulnerability is not critical, it should be addressed promptly to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
Since no official patch or vendor response is available, European organizations should implement immediate compensating controls. These include disabling XML external entity processing in the XML parsers used by Fengoffice, if configurable, to prevent XXE exploitation. Network-level controls such as restricting outbound HTTP/HTTPS traffic from the application server to prevent SSRF attempts can reduce risk. Employing web application firewalls (WAFs) with rules targeting XXE attack patterns can provide additional protection. Organizations should also monitor logs for suspicious XML payloads or unusual outbound requests. If feasible, upgrading to a newer, unaffected version of Fengoffice or migrating to alternative software should be considered. Regular security assessments and penetration testing focusing on XML handling can help identify residual risks. Finally, organizations should maintain strict access controls and segmentation to limit the impact of potential exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-5877: XML External Entity Reference in Fengoffice Feng Office
Description
A vulnerability, which was classified as problematic, has been found in Fengoffice Feng Office 3.2.2.1. Affected by this issue is some unknown functionality of the file /application/models/ApplicationDataObject.class.php of the component Document Upload Handler. The manipulation leads to xml external entity reference. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-5877 is a security vulnerability identified in Fengoffice Feng Office version 3.2.2.1, specifically within the Document Upload Handler component, located in the file /application/models/ApplicationDataObject.class.php. The vulnerability is classified as an XML External Entity (XXE) reference issue. XXE vulnerabilities occur when an application parses XML input containing references to external entities, which can be exploited by attackers to read arbitrary files, perform server-side request forgery (SSRF), or cause denial of service (DoS) conditions. In this case, the vulnerability allows remote attackers to manipulate XML input to trigger external entity references without requiring user interaction or authentication, as indicated by the CVSS vector. The vulnerability has been publicly disclosed, and although no known exploits are currently reported in the wild, the public disclosure increases the risk of exploitation attempts. The vendor has not responded to the disclosure, and no patches or mitigations have been provided yet. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the vulnerability's moderate impact on confidentiality, integrity, and availability, with low complexity and no required privileges or user interaction. The vulnerability affects a widely used collaboration and project management platform, which may be deployed in various organizational environments.
Potential Impact
For European organizations using Fengoffice Feng Office 3.2.2.1, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized disclosure of sensitive internal files or data through XXE attacks, potentially exposing confidential business information or user data. Additionally, attackers might leverage the vulnerability to perform SSRF attacks, which could be used to pivot within internal networks, access internal services, or disrupt availability. Given that Fengoffice is used for project management and collaboration, compromise could affect business continuity and data integrity. The lack of vendor response and absence of patches increases the window of exposure. Organizations in sectors with strict data protection regulations, such as GDPR in Europe, could face compliance risks and reputational damage if sensitive data is leaked. The medium severity indicates that while the vulnerability is not critical, it should be addressed promptly to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
Since no official patch or vendor response is available, European organizations should implement immediate compensating controls. These include disabling XML external entity processing in the XML parsers used by Fengoffice, if configurable, to prevent XXE exploitation. Network-level controls such as restricting outbound HTTP/HTTPS traffic from the application server to prevent SSRF attempts can reduce risk. Employing web application firewalls (WAFs) with rules targeting XXE attack patterns can provide additional protection. Organizations should also monitor logs for suspicious XML payloads or unusual outbound requests. If feasible, upgrading to a newer, unaffected version of Fengoffice or migrating to alternative software should be considered. Regular security assessments and penetration testing focusing on XML handling can help identify residual risks. Finally, organizations should maintain strict access controls and segmentation to limit the impact of potential exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-08T18:05:09.822Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6846d5937b622a9fdf225524
Added to database: 6/9/2025, 12:37:39 PM
Last enriched: 7/9/2025, 1:26:28 PM
Last updated: 8/17/2025, 12:52:45 AM
Views: 11
Related Threats
CVE-2025-43739: CWE-203 Observable Discrepancy in Liferay Portal
MediumCVE-2025-8218: CWE-269 Improper Privilege Management in imithemes Real Spaces - WordPress Properties Directory Theme
HighCVE-2025-6758: CWE-269 Improper Privilege Management in imithemes Real Spaces - WordPress Properties Directory Theme
CriticalCVE-2025-54336: n/a
CriticalCVE-2025-9140: SQL Injection in Shanghai Lingdang Information Technology Lingdang CRM
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.