Vulnerability DatabaseGHSA-432c-wxpg-m4q3

GHSA-432c-wxpg-m4q3
Python vulnerability analysis and mitigation

Overview

A file inclusion vulnerability was discovered in xml2rfc versions 3.12.0 through 3.26.0. The issue stems from inconsistent handling of the --allow-local-file-access flag, particularly when local files are specified as src in artwork or sourcecode elements. Additionally, XML entity references could access files within the source directory without requiring the --allow-local-file-access flag, potentially leading to unauthorized file access (GitHub Advisory).

Technical details

The vulnerability affects the file access control mechanism in xml2rfc. When processing XML files, the software does not properly enforce the --allow-local-file-access flag restrictions for artwork and sourcecode elements. Without the flag, XML entity references can still access any file in the xml2rfc templates directory and source directory. With the flag enabled, the software allows access to any file on the filesystem that the user running xml2rfc can access. The vulnerability has been assigned a CVSS v4.0 score of 6.9 (Moderate) with vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N (GitHub Advisory).

Impact

The vulnerability primarily affects systems running xml2rfc as a service that accepts input from external users. When exploited, attackers can read the contents of files within the source directory through the src attribute in artwork or sourcecode elements. While the access is limited to files within the same directory as the XML input source file for artwork and sourcecode elements, it still presents a security risk for systems processing untrusted XML files (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 3.27.0, which implements generalized file access checks and only allows access to files within the source directory and below. For users unable to upgrade immediately, the recommended workaround is to use a secure temporary directory to process untrusted XML files and avoid reusing it for processing other XML documents. The patch ensures that filesystem access is properly restricted based on the --allow-local-file-access flag setting (GitHub Commit).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67511CRITICAL9.6
  • PythonPython
  • cai-framework
NoNoDec 11, 2025
CVE-2025-13780CRITICAL9.1
  • PythonPython
  • pgadmin4
NoYesDec 11, 2025
CVE-2025-67644HIGH7.3
  • PythonPython
  • langgraph-checkpoint-sqlite
NoYesDec 11, 2025
CVE-2025-67720MEDIUM6.5
  • PythonPython
  • pyrofork
NoYesDec 11, 2025
CVE-2025-67485MEDIUM5.3
  • PythonPython
  • mad-proxy
NoNoDec 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management