WSO2 XML Parsers Vulnerable to External Entity Attacks

WSO2 XML Parsers Vulnerable to External Entity Attacks

The National Vulnerability Database (NVD) recently highlighted CVE-2024-2374, a high-severity vulnerability impacting multiple WSO2 products. According to the NVD, the XML parsers within these products fail to adequately configure against external entity resolution when processing user-supplied XML data. This oversight creates a critical attack vector, allowing malicious actors to craft XML payloads that force the parser to include external resources.

This flaw, categorized as CWE-611 (Improper Restriction of XML External Entity Reference), enables attackers to achieve significant unauthorized access. Leveraging this vulnerability, an attacker can read sensitive files from the underlying file system or access limited HTTP resources that the product itself can reach. Beyond data exfiltration, the NVD notes that this vulnerability can also be exploited to launch denial-of-service (DoS) attacks by exhausting server resources through recursive entity expansion or by fetching excessively large external resources, effectively taking systems offline. The CVSSv3.1 score for CVE-2024-2374 is 7.5 (HIGH), underscoring the serious implications of this unpatched issue. While specific affected product versions weren’t detailed, any WSO2 deployment utilizing XML parsing without proper hardening against XXE is potentially at risk.

Related ATT&CK Techniques

🛡️ Detection Rules

7 rules · 6 SIEM formats

7 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, QRadar AQL, and Wazuh.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2024-2374

✓ Sigma 🔒 Splunk SPL 🔒 Sentinel KQL 🔒 Elastic 🔒 QRadar AQL 🔒 Wazuh

Want this in your SIEM's native format? Get Splunk SPL, Sentinel KQL, Elastic, QRadar AQL, or Wazuh — ready to paste.

7 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get All SIEM Formats →

Indicators of Compromise

IDTypeIndicator
CVE-2024-2374 XML External Entity (XXE) WSO2 products XML parsers
CVE-2024-2374 Information Disclosure Read confidential files from the file system
CVE-2024-2374 Information Disclosure Access limited HTTP resources reachable by the product
CVE-2024-2374 DoS Exhaust server resources through recursive entity expansion
CVE-2024-2374 DoS Fetching large external resources

Related Posts

NIST NVD Prioritizes CISA KEV and Critical Software CVEs

NIST is refining its National Vulnerability Database (NVD) enrichment process, a move that SecurityWeek reports is aimed at optimizing the management of the sheer volume...

threat-intelvulnerability
/MEDIUM

CVE-2025-6024 — The authentication endpoint fails to encode user-supplied

CVE-2025-6024 — The authentication endpoint fails to encode user-supplied input before rendering it in the web page, allowing for script injection. An attacker can leverage...

vulnerabilityCVEcwe-79
/MEDIUM /⚑ 2 IOCs

CVE-2024-4867 — Cross-Site Scripting (XSS)

CVE-2024-4867 — The WSO2 API Manager developer portal accepts user-supplied input without enforcing expected validation constraints or proper output encoding. This deficiency allows a malicious...

vulnerabilityCVEcross-site-scripting-xss-cwe-79
/MEDIUM /⚑ 2 IOCs