Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28809: CWE-611 Improper Restriction of XML External Entity Reference in dropbox esaml

0
Medium
VulnerabilityCVE-2026-28809cvecve-2026-28809cwe-611
Published: Mon Mar 23 2026 (03/23/2026, 10:09:29 UTC)
Source: CVE Database V5
Vendor/Project: dropbox
Product: esaml

Description

CVE-2026-28809 is an XML External Entity (XXE) vulnerability affecting the esaml library used by Dropbox and its forks. The vulnerability arises because esaml parses attacker-controlled SAML messages using xmerl_scan:string/2 without disabling XML entity expansion before signature verification. On Erlang/OTP versions prior to 27, this allows an attacker to read local files, such as Kubernetes-mounted secrets, by embedding crafted XML entities in SAML messages. Although signature verification will fail for untrusted SAML service providers, the file contents may still be exposed through logs or error messages. This vulnerability can also enable Server-Side Request Forgery (SSRF) attacks. Systems running Erlang/OTP 27 or later are not affected due to the default disabling of XML entities in xmerl. The CVSS 4. 0 score is 6. 3 (medium severity), reflecting network attack vector, no privileges required, no user interaction, and limited confidentiality impact. No known exploits are currently reported in the wild.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 11:01:07 UTC

Technical Analysis

CVE-2026-28809 is a medium-severity XML External Entity (XXE) vulnerability in the esaml library and its forks, including those used by Dropbox. The root cause is the use of the Erlang xmerl XML parser's xmerl_scan:string/2 function to parse SAML messages before signature verification, without disabling XML entity expansion. On Erlang/OTP versions before 27, xmerl allows XML entities by default, enabling attackers to craft malicious SAML messages containing external entity references. When these messages are parsed, the system can be tricked into reading arbitrary local files, such as sensitive Kubernetes secrets mounted on the host. Although signature verification will reject messages from untrusted SAML service providers, the vulnerable parsing step occurs prior to verification, potentially exposing sensitive file contents through logs or error messages. Additionally, the vulnerability may enable SSRF attacks by referencing external resources. The issue affects all versions of esaml and its forks by arekinath, handnot2, and Dropbox, but is mitigated on Erlang/OTP 27 or later where xmerl disables entity expansion by default. No patches are currently linked, and no known exploits have been reported. The CVSS 4.0 vector indicates a network attack vector, no privileges or user interaction required, and limited confidentiality impact due to the indirect exposure method.

Potential Impact

Organizations using esaml or its forks in environments running Erlang/OTP versions prior to 27 are at risk of sensitive information disclosure. Attackers can exploit this vulnerability remotely without authentication or user interaction by sending crafted SAML messages, potentially exposing local files such as Kubernetes secrets or other sensitive configuration files. This can lead to leakage of credentials, private keys, or other confidential data, undermining the confidentiality of the affected systems. The SSRF potential could allow attackers to pivot within internal networks, accessing internal services not otherwise exposed externally. Although signature verification prevents acceptance of malicious SAML assertions from untrusted sources, the pre-verification parsing step still exposes sensitive data indirectly. This vulnerability could impact cloud service providers, enterprises using SAML-based single sign-on solutions, and any organization relying on esaml for SAML processing. The scope is limited to systems using vulnerable esaml versions on older Erlang runtimes, but the impact on confidentiality and potential for lateral movement is significant.

Mitigation Recommendations

To mitigate CVE-2026-28809, organizations should upgrade their Erlang/OTP runtime to version 27 or later, where the xmerl parser disables XML entity expansion by default, effectively preventing XXE attacks. If upgrading Erlang is not immediately possible, users should patch or update the esaml library and its forks to versions that explicitly disable XML entity expansion during SAML message parsing. Implement strict input validation and XML parsing configurations that disable external entity resolution before signature verification. Additionally, ensure that sensitive files such as Kubernetes secrets are not unnecessarily mounted or accessible to services processing untrusted XML input. Monitor logs and error messages for inadvertent leakage of sensitive data and restrict logging verbosity to avoid exposing file contents. Employ network segmentation and firewall rules to limit SSRF attack impact. Finally, conduct regular security assessments and code reviews focusing on XML parsing and SAML processing components.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
EEF
Date Reserved
2026-03-03T14:40:00.590Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c119e0f4197a8e3b3cb44c

Added to database: 3/23/2026, 10:45:52 AM

Last enriched: 3/23/2026, 11:01:07 AM

Last updated: 3/23/2026, 3:28:16 PM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses