Wiz Agents & Workflows are here

CVE-2025-64518
Java vulnerability analysis and mitigation

Overview

CVE-2025-64518 affects the CycloneDX core Java module (cyclonedx-core-java), versions 2.1.0 through 11.0.0. The vulnerability was discovered in November 2025 and involves an XML External Entity (XXE) injection vulnerability in the XML validation functionality. The issue arose because the XML Validator used by cyclonedx-core-java was not configured securely, making the library vulnerable to XXE attacks. This vulnerability is a continuation of an incomplete fix for a previous issue (CVE-2024-38374) that only addressed XML BOM parsing but not validation (GitHub Advisory).

Technical details

The vulnerability is classified as CWE-611 (Improper Restriction of XML External Entity Reference) with a CVSS v3.1 score of 7.5 (High). The root cause was the insecure configuration of javax.xml.validation.SchemaFactory in the XML validation process, which failed to disable the processing of external XML entities. The vulnerability specifically affects the validation functionality of XML BOMs, where the SchemaFactory was not properly configured to prevent XXE attacks (GitHub Advisory, OWASP XXE).

Impact

When exploited, this vulnerability could allow attackers to perform XML External Entity (XXE) injection attacks through specially crafted XML documents during the validation process. This could potentially lead to unauthorized disclosure of sensitive information, server-side request forgery (SSRF), or denial of service attacks (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in cyclonedx-core-java version 11.0.1. The fix includes proper configuration of the SchemaFactory by setting ACCESS_EXTERNAL_DTD and ACCESS_EXTERNAL_SCHEMA properties to empty strings and enabling FEATURE_SECURE_PROCESSING. As a workaround, if upgrading is not immediately possible, applications can reject XML documents before handing them to cyclonedx-core-java for validation, particularly if incoming CycloneDX BOMs are known to be in JSON format (GitHub Advisory, GitHub PR).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-34361CRITICAL9.3
  • JavaJava
  • ca.uhn.hapi.fhir:org.hl7.fhir.validation
NoYesMar 30, 2026
CVE-2026-34214HIGH7.7
  • JavaJava
  • trino
NoYesMar 29, 2026
CVE-2026-34359HIGH7.4
  • JavaJava
  • ca.uhn.hapi.fhir:org.hl7.fhir.core
NoYesMar 30, 2026
CVE-2026-34237MEDIUM6.1
  • JavaJava
  • io.modelcontextprotocol.sdk:mcp-core
NoYesMar 30, 2026
CVE-2026-34360MEDIUM5.8
  • JavaJava
  • ca.uhn.hapi.fhir:org.hl7.fhir.core
NoYesMar 30, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management