CVE-2025-66516: CWE-611 Improper Restriction of XML External Entity Reference in Apache Software Foundation Apache Tika core
Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. This CVE covers the same vulnerability as in CVE-2025-54988. However, this CVE expands the scope of affected packages in two ways. First, while the entrypoint for the vulnerability was the tika-parser-pdf-module as reported in CVE-2025-54988, the vulnerability and its fix were in tika-core. Users who upgraded the tika-parser-pdf-module but did not upgrade tika-core to >= 3.2.2 would still be vulnerable. Second, the original report failed to mention that in the 1.x Tika releases, the PDFParser was in the "org.apache.tika:tika-parsers" module.
AI Analysis
Technical Summary
CVE-2025-66516 is an XML External Entity (XXE) vulnerability classified under CWE-611, found in Apache Tika core and its associated modules (tika-core versions 1.13 through 3.2.1, tika-pdf-module 2.0.0 through 3.2.1, and tika-parsers 1.13 through 1.28.5). Apache Tika is a widely used content analysis toolkit that extracts metadata and text from various document formats, including PDFs. The vulnerability arises from improper restriction of XML External Entity references when parsing XFA (XML Forms Architecture) files embedded within PDFs. An attacker can craft a malicious PDF containing a specially designed XFA file that triggers the XXE flaw, enabling them to read arbitrary files on the host system, cause denial of service, or execute other malicious actions impacting confidentiality, integrity, and availability. This CVE extends the scope of a previously reported vulnerability (CVE-2025-54988) by clarifying that the root cause and fix reside in tika-core, meaning that upgrading only tika-pdf-module is insufficient; tika-core must also be updated to version 3.2.2 or later. The vulnerability does not require authentication or user interaction, increasing its risk. Despite the high CVSS score of 8.4, no known exploits have been reported in the wild yet. The vulnerability affects all platforms running the vulnerable versions of Apache Tika, which is commonly embedded in enterprise content management systems, search engines, and document processing pipelines.
Potential Impact
The impact of CVE-2025-66516 is significant for organizations worldwide that rely on Apache Tika for document parsing and content extraction. Successful exploitation allows attackers to perform XML External Entity injection attacks, which can lead to unauthorized disclosure of sensitive files, server-side request forgery, denial of service, and potentially remote code execution depending on the environment. This compromises confidentiality, integrity, and availability of affected systems. Since Apache Tika is integrated into many enterprise applications, including document management systems, email gateways, and data indexing services, the vulnerability could be leveraged to infiltrate internal networks, exfiltrate sensitive data, or disrupt critical business processes. The lack of required authentication or user interaction lowers the barrier for exploitation, increasing the threat surface. Organizations processing untrusted or user-uploaded PDFs are at particular risk. Failure to patch could lead to data breaches, operational downtime, regulatory non-compliance, and reputational damage.
Mitigation Recommendations
To mitigate CVE-2025-66516, organizations should immediately upgrade all Apache Tika components to tika-core version 3.2.2 or later, ensuring that tika-pdf-module and tika-parsers are also updated to compatible versions to fully address the vulnerability. It is critical to verify that all Tika modules are consistently updated, as upgrading only tika-pdf-module without upgrading tika-core leaves systems vulnerable. Additionally, implement strict input validation and sandboxing for document parsing processes to limit exposure to malicious files. Employ network segmentation and least privilege principles to restrict access to systems running Apache Tika. Monitor logs for unusual XML parsing errors or unexpected file access patterns indicative of XXE exploitation attempts. Where possible, disable or restrict external entity resolution in XML parsers used by Tika if configurable. Finally, conduct regular security assessments and penetration testing focused on document ingestion pipelines to detect potential exploitation.
Affected Countries
United States, Germany, United Kingdom, France, India, China, Japan, South Korea, Australia, Canada, Brazil, Netherlands
CVE-2025-66516: CWE-611 Improper Restriction of XML External Entity Reference in Apache Software Foundation Apache Tika core
Description
Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. This CVE covers the same vulnerability as in CVE-2025-54988. However, this CVE expands the scope of affected packages in two ways. First, while the entrypoint for the vulnerability was the tika-parser-pdf-module as reported in CVE-2025-54988, the vulnerability and its fix were in tika-core. Users who upgraded the tika-parser-pdf-module but did not upgrade tika-core to >= 3.2.2 would still be vulnerable. Second, the original report failed to mention that in the 1.x Tika releases, the PDFParser was in the "org.apache.tika:tika-parsers" module.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-66516 is an XML External Entity (XXE) vulnerability classified under CWE-611, found in Apache Tika core and its associated modules (tika-core versions 1.13 through 3.2.1, tika-pdf-module 2.0.0 through 3.2.1, and tika-parsers 1.13 through 1.28.5). Apache Tika is a widely used content analysis toolkit that extracts metadata and text from various document formats, including PDFs. The vulnerability arises from improper restriction of XML External Entity references when parsing XFA (XML Forms Architecture) files embedded within PDFs. An attacker can craft a malicious PDF containing a specially designed XFA file that triggers the XXE flaw, enabling them to read arbitrary files on the host system, cause denial of service, or execute other malicious actions impacting confidentiality, integrity, and availability. This CVE extends the scope of a previously reported vulnerability (CVE-2025-54988) by clarifying that the root cause and fix reside in tika-core, meaning that upgrading only tika-pdf-module is insufficient; tika-core must also be updated to version 3.2.2 or later. The vulnerability does not require authentication or user interaction, increasing its risk. Despite the high CVSS score of 8.4, no known exploits have been reported in the wild yet. The vulnerability affects all platforms running the vulnerable versions of Apache Tika, which is commonly embedded in enterprise content management systems, search engines, and document processing pipelines.
Potential Impact
The impact of CVE-2025-66516 is significant for organizations worldwide that rely on Apache Tika for document parsing and content extraction. Successful exploitation allows attackers to perform XML External Entity injection attacks, which can lead to unauthorized disclosure of sensitive files, server-side request forgery, denial of service, and potentially remote code execution depending on the environment. This compromises confidentiality, integrity, and availability of affected systems. Since Apache Tika is integrated into many enterprise applications, including document management systems, email gateways, and data indexing services, the vulnerability could be leveraged to infiltrate internal networks, exfiltrate sensitive data, or disrupt critical business processes. The lack of required authentication or user interaction lowers the barrier for exploitation, increasing the threat surface. Organizations processing untrusted or user-uploaded PDFs are at particular risk. Failure to patch could lead to data breaches, operational downtime, regulatory non-compliance, and reputational damage.
Mitigation Recommendations
To mitigate CVE-2025-66516, organizations should immediately upgrade all Apache Tika components to tika-core version 3.2.2 or later, ensuring that tika-pdf-module and tika-parsers are also updated to compatible versions to fully address the vulnerability. It is critical to verify that all Tika modules are consistently updated, as upgrading only tika-pdf-module without upgrading tika-core leaves systems vulnerable. Additionally, implement strict input validation and sandboxing for document parsing processes to limit exposure to malicious files. Employ network segmentation and least privilege principles to restrict access to systems running Apache Tika. Monitor logs for unusual XML parsing errors or unexpected file access patterns indicative of XXE exploitation attempts. Where possible, disable or restrict external entity resolution in XML parsers used by Tika if configurable. Finally, conduct regular security assessments and penetration testing focused on document ingestion pipelines to detect potential exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apache
- Date Reserved
- 2025-12-03T23:11:17.441Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6931b6d8739651d5d52faf55
Added to database: 12/4/2025, 4:29:12 PM
Last enriched: 2/27/2026, 6:19:39 AM
Last updated: 3/25/2026, 8:58:43 PM
Views: 1257
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.