Vulnerability DatabaseGHSA-7qfm-6m33-rgg9

GHSA-7qfm-6m33-rgg9
Java vulnerability analysis and mitigation

Overview

An XML External Entity (XXE) vulnerability was discovered in Report Portal's service-api component, tracked as GHSA-7qfm-6m33-rgg9. The vulnerability affects versions before 4.3.12 and 5.x versions before 5.1.1. The issue was discovered in May 2020 and was publicly disclosed on August 13, 2021. The vulnerability received a High severity rating with a CVSS score of 7.5 (GitHub Advisory).

Technical details

The vulnerability stems from improper configuration of the XML parser in the JUnit XML launch import feature, which was introduced in version 3.1.0. The parser was not configured to prevent XML external entity (XXE) attacks, allowing the processing of external Document Type Definition (DTD) files. This vulnerability is classified as CWE-611 (Improper Restriction of XML External Entity Reference) with a CVSS v3.1 base score of 7.5 (High), characterized by network attack vector, low attack complexity, no privileges required, and no user interaction needed (NVD Database, Security Advisory).

Impact

The vulnerability enables attackers to extract secrets from the Report Portal service-api module and potentially perform Server-Side Request Forgery (SSRF) attacks through specifically-crafted XML files that use external entities (Security Advisory).

Mitigation and workarounds

The vulnerability has been patched in versions 4.3.12 and 5.1.1 of the service-api component. Users are advised to upgrade to these versions or later, which disable external entity resolution for their XML parser. For version 4.x, users should update to docker pull reportportal/service-api:4.3.12, and for version 5.x, to docker pull reportportal/service-api:5.1.1 (Security Advisory).

Community reactions

The vulnerability was initially reported by an external security researcher, Julien M., who was acknowledged by the Report Portal Team for responsibly disclosing the issue (Security Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-26866HIGH8.8
  • JavaJava
  • org.apache.hugegraph:hg-pd-core
NoYesDec 12, 2025
CVE-2025-54981HIGH7.5
  • JavaJava
  • org.apache.streampark:streampark
NoYesDec 12, 2025
CVE-2025-67721MEDIUM6.3
  • JavaJava
  • trino
NoYesDec 12, 2025
CVE-2025-53960MEDIUM5.9
  • JavaJava
  • org.apache.streampark:streampark
NoYesDec 12, 2025
CVE-2025-54947MEDIUM5.3
  • JavaJava
  • org.apache.streampark:streampark
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management