expat before version 2.4.0 does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.
History

Tue, 25 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
Description expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE. expat before version 2.4.0 does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.
References

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00042}

epss

{'score': 0.00043}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2014-01-21T18:00:00

Updated: 2025-11-25T16:27:56.273Z

Reserved: 2012-12-06T00:00:00

Link: CVE-2013-0340

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-01-21T18:55:09.117

Modified: 2025-11-25T17:15:47.723

Link: CVE-2013-0340

cve-icon Redhat

Severity : Moderate

Publid Date: 2013-02-19T00:00:00Z

Links: CVE-2013-0340 - Bugzilla