Unauthenticated attackers can exploit a weakness in the XML parser functionality of Lobster_pro prior to version 4.12.6-GA. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.
History

Wed, 06 May 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Lobster-world
Lobster-world lobster Pro
CPEs cpe:2.3:a:lobster-world:lobster_pro:*:*:*:*:*:*:*:*
Vendors & Products Lobster-world
Lobster-world lobster Pro
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Fri, 01 May 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Lobster
Lobster lobster Pro
Vendors & Products Lobster
Lobster lobster Pro

Thu, 30 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
Description Unauthenticated attackers can exploit a weakness in the XML parser functionality of Lobster_pro prior to version 4.12.6-GA. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.
Title Arbitrary File Read and Server Side Request Forgery via XML External Entities in Lobster_pro
First Time appeared Lobster Gmbh
Lobster Gmbh lobster Pro
Weaknesses CWE-611
CPEs cpe:2.3:a:lobster_gmbh:lobster_pro:*:*:windows:*:*:*:*:*
cpe:2.3:a:lobster_gmbh:lobster_pro:4.12.6-ga:*:windows:*:*:*:*:*
Vendors & Products Lobster Gmbh
Lobster Gmbh lobster Pro
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N/S:N/AU:Y/V:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SCHUTZWERK

Published: 2026-04-30T12:11:46.544Z

Updated: 2026-04-30T13:15:37.670Z

Reserved: 2025-07-03T09:19:50.254Z

Link: CVE-2024-13971

cve-icon Vulnrichment

Updated: 2026-04-30T13:15:33.919Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-30T13:16:02.680

Modified: 2026-05-06T20:19:22.773

Link: CVE-2024-13971

cve-icon Redhat

No data.