Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32251: CWE-611: Improper Restriction of XML External Entity Reference in tolgee tolgee-platform

0
Critical
VulnerabilityCVE-2026-32251cvecve-2026-32251cwe-611
Published: Thu Mar 12 2026 (03/12/2026, 19:21:05 UTC)
Source: CVE Database V5
Vendor/Project: tolgee
Product: tolgee-platform

Description

CVE-2026-32251 is a critical XML External Entity (XXE) vulnerability in tolgee-platform versions prior to 3. 166. 3. The issue arises because the XML parsers used for importing Android XML and . resx translation files do not disable external entity processing. An authenticated user with permission to import translation files can exploit this flaw to read arbitrary files on the server and perform server-side requests to internal services, potentially exposing sensitive data and internal network resources. The vulnerability has a CVSS 4. 0 score of 9. 3, indicating critical severity, and requires no user interaction or privileges beyond authentication. Although no known exploits are currently reported in the wild, the impact could be severe if weaponized.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 02:35:42 UTC

Technical Analysis

CVE-2026-32251 is an XML External Entity (XXE) vulnerability classified under CWE-611 affecting the tolgee-platform, an open-source localization platform. The vulnerability exists because the XML parsers used to import Android XML resource files (.xml) and .resx files do not disable external entity processing prior to version 3.166.3. This improper restriction allows an authenticated user who can upload translation files to craft malicious XML payloads containing external entity references. When processed by the vulnerable XML parser, these payloads enable the attacker to read arbitrary files on the server filesystem and perform server-side request forgery (SSRF) to internal services. The flaw does not require elevated privileges beyond authentication and does not require user interaction, making exploitation straightforward once access is gained. The vulnerability has a CVSS 4.0 base score of 9.3, reflecting its critical impact on confidentiality and integrity. The vulnerability was publicly disclosed on March 12, 2026, and fixed in version 3.166.3 of tolgee-platform. No known exploits have been reported in the wild yet, but the potential for data exfiltration and internal network reconnaissance is significant. Organizations using tolgee-platform for localization, especially those importing Android or .resx translation files, must upgrade to the patched version and audit user permissions for importing translation files to mitigate risk.

Potential Impact

The impact of CVE-2026-32251 is substantial for organizations using tolgee-platform versions prior to 3.166.3. Exploitation allows an authenticated user to read arbitrary files on the server, potentially exposing sensitive configuration files, credentials, or proprietary data. Additionally, the ability to make server-side requests to internal services can facilitate further network reconnaissance, lateral movement, or exploitation of internal-only services not exposed externally. This can lead to significant confidentiality breaches and compromise of internal infrastructure. Since tolgee-platform is used for localization management, organizations with sensitive intellectual property or regulated data in their translation files or internal systems are at heightened risk. The vulnerability's ease of exploitation—requiring only authenticated access and no user interaction—means insider threats or compromised user accounts can quickly lead to severe data breaches. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the criticality of patching. Failure to remediate could result in data leakage, disruption of localization workflows, and potential compliance violations.

Mitigation Recommendations

To mitigate CVE-2026-32251, organizations should immediately upgrade tolgee-platform to version 3.166.3 or later, where the XML parser properly disables external entity processing. Until the upgrade is applied, restrict the ability to import translation files to a minimal set of trusted, authenticated users to reduce the attack surface. Implement strict access controls and monitor import activities for suspicious or anomalous file uploads. Employ network segmentation and firewall rules to limit tolgee-platform server access to internal services, reducing the impact of SSRF attacks. Additionally, conduct regular audits of server file permissions and logs to detect unauthorized file access attempts. Consider deploying runtime application self-protection (RASP) or web application firewalls (WAFs) with rules targeting XXE payloads to provide an additional layer of defense. Finally, educate developers and administrators about secure XML parsing practices and the risks of enabling external entity processing.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-11T14:47:05.686Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b317b02f860ef943e64732

Added to database: 3/12/2026, 7:44:48 PM

Last enriched: 3/20/2026, 2:35:42 AM

Last updated: 4/26/2026, 8:05:36 PM

Views: 108

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses