Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2536: XML External Entity Reference in opencc JFlow

0
Medium
VulnerabilityCVE-2026-2536cvecve-2026-2536
Published: Mon Feb 16 2026 (02/16/2026, 05:02:14 UTC)
Source: CVE Database V5
Vendor/Project: opencc
Product: JFlow

Description

A vulnerability was determined in opencc JFlow up to 20260129. This affects the function Imp_Done of the file src/main/java/bp/wf/httphandler/WF_Admin_AttrFlow.java of the component Workflow Engine. This manipulation of the argument File causes xml external entity reference. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:18:05 UTC

Technical Analysis

CVE-2026-2536 identifies a medium-severity XML External Entity (XXE) vulnerability in the opencc JFlow product, specifically within the Workflow Engine component's Imp_Done function located in src/main/java/bp/wf/httphandler/WF_Admin_AttrFlow.java. The vulnerability arises from improper handling of XML input files, allowing an attacker to manipulate the File argument to trigger external entity references. This can lead to disclosure of internal files, server-side request forgery (SSRF), or denial of service by exhausting resources. The vulnerability can be exploited remotely without user interaction and requires only low-level privileges, increasing its risk profile. The opencc project was notified early but has not yet issued a patch or official response. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no authentication needed, and partial impacts on confidentiality, integrity, and availability. No known exploits are currently in the wild, but public disclosure increases the likelihood of future exploitation. The lack of vendor mitigation necessitates immediate defensive actions by users of the affected version 20260129.

Potential Impact

The XXE vulnerability in opencc JFlow can lead to unauthorized disclosure of sensitive information, including internal files and system metadata, through external entity resolution. Attackers may also leverage this flaw to perform SSRF attacks, potentially accessing internal network resources or services not otherwise exposed. Additionally, crafted XML payloads could cause denial of service by exhausting server resources or triggering application crashes. For organizations relying on opencc JFlow in critical workflow automation, this could disrupt business processes, compromise data confidentiality, and undermine system integrity. The medium CVSS score reflects moderate risk, but the ease of remote exploitation without user interaction or high privileges increases the threat. The absence of a vendor patch prolongs exposure, raising the urgency for mitigation. Industries with sensitive workflows or regulatory compliance requirements face heightened risk of reputational damage and operational impact if exploited.

Mitigation Recommendations

Given the absence of an official patch, organizations should implement immediate mitigations to reduce risk. First, restrict access to the vulnerable Workflow Engine component by limiting network exposure through firewalls and segmentation, allowing only trusted hosts to communicate with the service. Employ XML parsing configurations that disable external entity processing (e.g., disabling DTDs and external entity resolution) within the application if source code or configuration access is possible. Monitor logs for unusual XML processing errors or unexpected outbound network connections indicative of exploitation attempts. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious XML payloads containing external entity references. If feasible, upgrade or replace the affected opencc JFlow version once a patch is released. Conduct regular security assessments and penetration tests focusing on XML input handling. Finally, maintain awareness of vendor communications and threat intelligence updates related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-15T09:19:07.190Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6992ac53bda29fb02f486070

Added to database: 2/16/2026, 5:34:11 AM

Last enriched: 2/23/2026, 9:18:05 PM

Last updated: 4/6/2026, 8:56:25 PM

Views: 102

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses