Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3511: CWE-611 Improper Restriction of XML External Entity Reference in Slovensko.Digital Autogram

0
High
VulnerabilityCVE-2026-3511cvecve-2026-3511cwe-611
Published: Thu Mar 19 2026 (03/19/2026, 11:25:44 UTC)
Source: CVE Database V5
Vendor/Project: Slovensko.Digital
Product: Autogram

Description

Improper Restriction of XML External Entity Reference vulnerability in XMLUtils.java in Slovensko.Digital Autogram allows remote unauthenticated attacker to conduct SSRF (Server Side Request Forgery) attacks and obtain unauthorized access to local files on filesystems running the vulnerable application. Successful exploitation requires the victim to visit a specially crafted website that sends request containing a specially crafted XML document to /sign endpoint of the local HTTP server run by the application.

AI-Powered Analysis

AILast updated: 03/19/2026, 14:08:48 UTC

Technical Analysis

CVE-2026-3511 is an XML External Entity (XXE) vulnerability classified under CWE-611 found in the XMLUtils.java component of the Slovensko.Digital Autogram application. This vulnerability arises from improper restriction of XML external entity references, allowing an attacker to craft malicious XML documents that the vulnerable XML parser processes. When a victim visits a specially crafted website, it triggers the browser or client to send a request containing the malicious XML payload to the /sign endpoint of the locally running Autogram HTTP server. This leads to Server Side Request Forgery (SSRF), enabling the attacker to make the server perform unauthorized requests to internal resources or access local filesystem files. The vulnerability does not require authentication or user interaction beyond visiting the malicious site, making it highly exploitable. The impact is primarily on confidentiality, as attackers can read sensitive files, but it does not affect data integrity or system availability. The vulnerability affects version 0 of Autogram, with no patches currently listed. Although no known exploits are reported in the wild, the high CVSS score (8.6) indicates a critical risk. The vulnerability's scope is local HTTP servers running Autogram, which may be deployed in Slovensko.Digital's digital services or related environments. The improper XML parsing and lack of external entity restrictions are the root causes, highlighting the need for secure XML processing practices.

Potential Impact

The primary impact of CVE-2026-3511 is unauthorized disclosure of sensitive local files and internal network resources due to SSRF facilitated by XXE attacks. Organizations running the vulnerable Autogram application risk exposure of confidential data, including configuration files, credentials, or other sensitive information stored on the local filesystem. This can lead to further compromise if attackers leverage disclosed information for lateral movement or privilege escalation. Since the attack requires no authentication and minimal user interaction, the attack surface is broad, especially in environments where users may be tricked into visiting malicious websites. The vulnerability does not directly affect data integrity or availability but significantly compromises confidentiality, which can undermine trust in affected digital services. Given the application’s likely use in Slovak digital identity or signing services, the impact could extend to critical government or citizen data, raising national security concerns. The absence of known exploits in the wild suggests a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

To mitigate CVE-2026-3511, organizations should immediately implement the following specific measures: 1) Disable or properly configure XML external entity processing in the XML parser used by Autogram to prevent processing of external entities. This may involve updating XML parser libraries or applying secure parser configurations that disallow DTDs or external entity resolution. 2) Implement strict input validation and sanitization on XML inputs received at the /sign endpoint to detect and reject malicious payloads. 3) Employ network segmentation and firewall rules to restrict the local HTTP server’s ability to make outbound requests or access sensitive internal resources, limiting SSRF impact. 4) Monitor logs for unusual requests to the /sign endpoint containing XML payloads with entity declarations or suspicious patterns. 5) Educate users about phishing risks to reduce the likelihood of visiting malicious websites that trigger exploitation. 6) Coordinate with Slovensko.Digital for official patches or updates and apply them promptly once available. 7) Consider deploying Web Application Firewalls (WAFs) with rules targeting XXE and SSRF attack signatures to provide an additional layer of defense. These targeted mitigations go beyond generic advice by focusing on XML parser hardening, network controls, and proactive detection tailored to this vulnerability’s exploitation vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
SK-CERT
Date Reserved
2026-03-04T10:42:40.045Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bc0011e32a4fbe5fc6a5d9

Added to database: 3/19/2026, 1:54:25 PM

Last enriched: 3/19/2026, 2:08:48 PM

Last updated: 3/20/2026, 5:19:40 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses