Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2074: XML External Entity Reference in O2OA

0
Medium
VulnerabilityCVE-2026-2074cvecve-2026-2074
Published: Sat Feb 07 2026 (02/07/2026, 04:02:06 UTC)
Source: CVE Database V5
Product: O2OA

Description

A vulnerability was identified in O2OA up to 9.0.0. This impacts an unknown function of the file /x_program_center/jaxrs/mpweixin/check of the component HTTP POST Request Handler. The manipulation leads to xml external entity reference. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:12:02 UTC

Technical Analysis

CVE-2026-2074 identifies an XML External Entity (XXE) vulnerability in the O2OA platform, specifically in the HTTP POST request handler component located at /x_program_center/jaxrs/mpweixin/check. XXE vulnerabilities occur when XML input containing external entity references is processed insecurely, allowing attackers to read arbitrary files, perform server-side request forgery (SSRF), or cause denial of service. In this case, the vulnerability allows remote attackers to craft malicious XML payloads that exploit the external entity processing feature, potentially leading to unauthorized disclosure of sensitive data or impacting system integrity and availability. The vulnerability affects O2OA version 9.0.0 and earlier, with no authentication or user interaction required, making it remotely exploitable over the network. The CVSS 4.0 base score is 5.3 (medium severity), reflecting low complexity and no privileges required but limited impact scope and partial confidentiality, integrity, and availability impacts. The vendor was notified but has not issued a patch or response, and public exploit code is available, increasing the risk of exploitation. The lack of patching and vendor engagement heightens the urgency for organizations to implement mitigations. This vulnerability highlights the importance of secure XML parsing configurations and input validation in web applications handling XML data.

Potential Impact

The impact of CVE-2026-2074 can be significant for organizations using O2OA 9.0.0 or earlier. Successful exploitation can lead to unauthorized disclosure of sensitive information through reading local files or internal resources, potentially exposing credentials, configuration files, or other confidential data. Integrity could be compromised if attackers manipulate XML processing to alter application behavior or data. Availability impacts may arise from denial-of-service conditions triggered by malicious XML payloads. Since the vulnerability is remotely exploitable without authentication or user interaction, attackers can target exposed O2OA instances over the internet or internal networks. This increases the risk of automated scanning and exploitation attempts, especially given the availability of public exploit code. Organizations relying on O2OA for critical business processes or handling sensitive data face risks of data breaches, compliance violations, and operational disruptions. The vendor's lack of response and absence of patches further exacerbate the threat, requiring organizations to take immediate protective actions. The scope of affected systems is limited to O2OA deployments, but given O2OA's use in certain enterprise environments, the impact can be material for affected entities.

Mitigation Recommendations

To mitigate CVE-2026-2074, organizations should first isolate and restrict access to the vulnerable O2OA endpoint /x_program_center/jaxrs/mpweixin/check, limiting exposure to trusted networks only. Implement network-level controls such as firewalls or web application firewalls (WAFs) to detect and block malicious XML payloads containing external entity references. Disable or properly configure XML parsers used by O2OA to prevent processing of external entities; this typically involves disabling DTD processing or enabling secure parser features that prohibit external entity resolution. Monitor logs for unusual XML requests or error patterns indicative of XXE exploitation attempts. If possible, upgrade to a patched version once available or apply vendor-provided fixes. In the absence of vendor patches, consider deploying runtime application self-protection (RASP) solutions that can intercept and block malicious XML inputs. Conduct thorough security testing and code review of custom integrations with O2OA to ensure no additional XML processing vulnerabilities exist. Educate security teams about this vulnerability and maintain heightened alertness for exploitation attempts. Finally, maintain regular backups and incident response plans to quickly recover from potential compromises.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T07:46:08.815Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6986f13ef9fa50a62f11d4c9

Added to database: 2/7/2026, 8:01:02 AM

Last enriched: 2/23/2026, 10:12:02 PM

Last updated: 3/24/2026, 10:10:47 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses