Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66371: CWE-611 Improper Restriction of XML External Entity Reference in Iteras Peppol-py

0
Medium
VulnerabilityCVE-2025-66371cvecve-2025-66371cwe-611
Published: Fri Nov 28 2025 (11/28/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Iteras
Product: Peppol-py

Description

CVE-2025-66371 is a medium-severity XML External Entity (XXE) vulnerability in Iteras Peppol-py versions before 1. 1. 1. The issue arises from improper configuration of the Saxon XML parser, allowing attackers to exploit XML invoice validation to read arbitrary files from the filesystem. This can lead to partial confidentiality breaches by exposing sensitive file contents to remote attackers without requiring user interaction. The vulnerability requires low privileges but no user interaction and affects systems processing XML-based invoices using Peppol-py. No known exploits are currently reported in the wild. European organizations relying on Peppol-py for e-invoicing should prioritize patching or mitigating this flaw to prevent data leakage. Countries with significant adoption of Peppol e-invoicing standards and strong digital trade infrastructures are most at risk.

AI-Powered Analysis

AILast updated: 12/05/2025, 04:28:24 UTC

Technical Analysis

CVE-2025-66371 is an XML External Entity (XXE) vulnerability classified under CWE-611, affecting the Iteras Peppol-py library versions prior to 1.1.1. Peppol-py is used for validating XML-based invoices compliant with the Peppol e-procurement framework. The vulnerability stems from the Saxon XML parser configuration, which does not properly restrict external entity references during XML processing. This misconfiguration allows an attacker to craft malicious XML input containing external entity declarations that cause the parser to read arbitrary files from the local filesystem. When such a malicious invoice is processed, the contents of these files can be exfiltrated to a remote attacker, resulting in a confidentiality breach. The CVSS v3.1 base score is 5.0 (medium), reflecting that the attack vector is network-based, requires low privileges, no user interaction, and impacts confidentiality only. The scope is changed, indicating that the vulnerability affects components beyond the immediate application. No integrity or availability impacts are noted. No public exploits have been reported yet, but the vulnerability poses a risk to organizations using Peppol-py for automated invoice validation, especially in environments where sensitive data resides on the same system. The lack of a patch link suggests that a fixed version (1.1.1 or later) should be obtained from the vendor or mitigations applied to disable external entity processing in the Saxon parser configuration.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information stored on systems processing Peppol invoices, such as configuration files, credentials, or personal data. Given the widespread adoption of the Peppol framework in Europe for cross-border e-invoicing and public procurement, the risk is significant for companies and government agencies relying on Peppol-py. Exposure of confidential data could result in regulatory non-compliance under GDPR, reputational damage, and potential financial losses. The vulnerability does not directly affect system integrity or availability but could be leveraged as a stepping stone for further attacks if sensitive credentials or secrets are exposed. Organizations with automated invoice processing pipelines that do not isolate or sandbox XML parsing are particularly vulnerable. The medium severity rating reflects a moderate but tangible risk, especially in sectors handling sensitive procurement data or intellectual property.

Mitigation Recommendations

European organizations should immediately upgrade Peppol-py to version 1.1.1 or later where the vulnerability is addressed. If upgrading is not immediately feasible, organizations should configure the Saxon XML parser to disable external entity resolution explicitly, preventing XXE exploitation. This can be done by setting secure parser features such as disallowing DOCTYPE declarations and external entity processing. Additionally, implement strict input validation and XML schema validation to reject malformed or unexpected XML content. Employ network-level controls to restrict outbound connections from systems processing invoices to prevent data exfiltration. Monitor logs for unusual XML parsing errors or unexpected file access attempts. Consider isolating invoice processing systems in segmented network zones with minimal privileges and no access to sensitive files. Regularly audit and review XML processing components and dependencies for security updates. Finally, raise awareness among developers and system administrators about XXE risks and secure XML handling best practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692919d1a7cba954100dd856

Added to database: 11/28/2025, 3:41:05 AM

Last enriched: 12/5/2025, 4:28:24 AM

Last updated: 1/12/2026, 8:51:31 AM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats