XML External Entity injection in OpenOlat - CVE-2024-28198

 

XML External Entity injection in OpenOlat - CVE-2024-28198

Published: March 11, 2024 / Updated: April 27, 2026


Vulnerability identifier: #VU128162
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2024-28198
CWE-ID: CWE-611
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
OpenOlat
Software vendor:
OpenOlat

Description

The vulnerability allows a remote user to read arbitrary files and perform server-side request forgery.

The vulnerability exists due to improper restriction of xml external entity reference in the draw.io endpoint when processing manipulated HTTP requests through the draw.io integration. A remote user can send specially crafted requests to read arbitrary files and perform server-side request forgery.

User interaction is required, and file access occurs with the privileges of the configured system user.


Remediation

Install security update from vendor's website.

External links