Skip to main content

CVE-2025-5877: XML External Entity Reference in Fengoffice Feng Office

Medium
VulnerabilityCVE-2025-5877cvecve-2025-5877
Published: Mon Jun 09 2025 (06/09/2025, 12:31:04 UTC)
Source: CVE Database V5
Vendor/Project: Fengoffice
Product: Feng Office

Description

A vulnerability, which was classified as problematic, has been found in Fengoffice Feng Office 3.2.2.1. Affected by this issue is some unknown functionality of the file /application/models/ApplicationDataObject.class.php of the component Document Upload Handler. The manipulation leads to xml external entity reference. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/09/2025, 13:26:28 UTC

Technical Analysis

CVE-2025-5877 is a security vulnerability identified in Fengoffice Feng Office version 3.2.2.1, specifically within the Document Upload Handler component, located in the file /application/models/ApplicationDataObject.class.php. The vulnerability is classified as an XML External Entity (XXE) reference issue. XXE vulnerabilities occur when an application parses XML input containing references to external entities, which can be exploited by attackers to read arbitrary files, perform server-side request forgery (SSRF), or cause denial of service (DoS) conditions. In this case, the vulnerability allows remote attackers to manipulate XML input to trigger external entity references without requiring user interaction or authentication, as indicated by the CVSS vector. The vulnerability has been publicly disclosed, and although no known exploits are currently reported in the wild, the public disclosure increases the risk of exploitation attempts. The vendor has not responded to the disclosure, and no patches or mitigations have been provided yet. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the vulnerability's moderate impact on confidentiality, integrity, and availability, with low complexity and no required privileges or user interaction. The vulnerability affects a widely used collaboration and project management platform, which may be deployed in various organizational environments.

Potential Impact

For European organizations using Fengoffice Feng Office 3.2.2.1, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized disclosure of sensitive internal files or data through XXE attacks, potentially exposing confidential business information or user data. Additionally, attackers might leverage the vulnerability to perform SSRF attacks, which could be used to pivot within internal networks, access internal services, or disrupt availability. Given that Fengoffice is used for project management and collaboration, compromise could affect business continuity and data integrity. The lack of vendor response and absence of patches increases the window of exposure. Organizations in sectors with strict data protection regulations, such as GDPR in Europe, could face compliance risks and reputational damage if sensitive data is leaked. The medium severity indicates that while the vulnerability is not critical, it should be addressed promptly to prevent escalation or chaining with other vulnerabilities.

Mitigation Recommendations

Since no official patch or vendor response is available, European organizations should implement immediate compensating controls. These include disabling XML external entity processing in the XML parsers used by Fengoffice, if configurable, to prevent XXE exploitation. Network-level controls such as restricting outbound HTTP/HTTPS traffic from the application server to prevent SSRF attempts can reduce risk. Employing web application firewalls (WAFs) with rules targeting XXE attack patterns can provide additional protection. Organizations should also monitor logs for suspicious XML payloads or unusual outbound requests. If feasible, upgrading to a newer, unaffected version of Fengoffice or migrating to alternative software should be considered. Regular security assessments and penetration testing focusing on XML handling can help identify residual risks. Finally, organizations should maintain strict access controls and segmentation to limit the impact of potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-08T18:05:09.822Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6846d5937b622a9fdf225524

Added to database: 6/9/2025, 12:37:39 PM

Last enriched: 7/9/2025, 1:26:28 PM

Last updated: 8/17/2025, 12:52:45 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats