Pachno Suffers Critical XML Injection Vulnerability (CVE-2026-40042)
A critical XML External Entity (XXE) injection vulnerability, identified as CVE-2026-40042, has been reported in Pachno version 1.0.6. According to the National Vulnerability Database, this flaw allows unauthenticated attackers to read arbitrary files on affected systems. The vulnerability stems from unsafe XML parsing within Pachno’s TextParser helper.
Attackers can exploit this by injecting malicious XML entities directly into issue descriptions, comments, or wiki articles using standard wiki table syntax and inline tags. The simplexml_load_string() function, which lacks LIBXML_NONET restrictions, then processes these entities, triggering their resolution and ultimately enabling file disclosure. Given its CVSS v3.1 score of 9.8, this is a top-tier critical vulnerability that demands immediate attention.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 5 SIEM formats3 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-40042
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
3 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-40042 | XML External Entity Injection | Pachno 1.0.6 |
| CVE-2026-40042 | XML External Entity Injection | CWE-611 |
| CVE-2026-40042 | XML External Entity Injection | TextParser helper |
| CVE-2026-40042 | XML External Entity Injection | unsafe XML parsing via simplexml_load_string() without LIBXML_NONET |
| CVE-2026-40042 | Information Disclosure | Arbitrary file read |