CVE-2024-8010 - XML External Entity Injection via Publisher in WSO2 API Manager Allows Reading Arbitrary Files
CVE ID :CVE-2024-8010
Published : April 16, 2026, 10:16 a.m. | 3 hours, 24 minutes ago
Description :The component accepts XML input through the publisher without disabling external entity resolution. This allows malicious actors to submit a crafted XML payload that exploits the unescaped external entity references. By leveraging this vulnerability, a malicious actor can read confidential files from the product's file system or access limited HTTP resources reachable via HTTP GET requests to the vulnerable product.
Severity: 3.5 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
Published : April 16, 2026, 10:16 a.m. | 3 hours, 24 minutes ago
Description :The component accepts XML input through the publisher without disabling external entity resolution. This allows malicious actors to submit a crafted XML payload that exploits the unescaped external entity references. By leveraging this vulnerability, a malicious actor can read confidential files from the product's file system or access limited HTTP resources reachable via HTTP GET requests to the vulnerable product.
Severity: 3.5 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...