You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
xml2rfc has an arbitrary file read vulnerability
High severity
GitHub Reviewed
Published
Aug 26, 2025
in
ietf-tools/xml2rfc
•
Updated Aug 26, 2025
When generating PDF files, this vulnerability allows an attacker to read arbitrary files from the filesystem by injecting malicious link element into the XML.
Workarounds
Test untrusted input with link elements with rel="attachment" before processing.
Credits
This vulnerability was reported by Mohamed Ouad from Doyensec.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Learn more on MITRE.
Impact
When generating PDF files, this vulnerability allows an attacker to read arbitrary files from the filesystem by injecting malicious link element into the XML.
Workarounds
Test untrusted input with
link
elements withrel="attachment"
before processing.Credits
This vulnerability was reported by Mohamed Ouad from Doyensec.
References