{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2074","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-06T07:46:08.815Z","datePublished":"2026-02-07T04:02:06.652Z","dateUpdated":"2026-02-23T09:29:26.009Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T09:29:26.009Z"},"title":"O2OA HTTP POST Request check xml external entity reference","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-611","lang":"en","description":"XML External Entity Reference"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-610","lang":"en","description":"Externally Controlled Reference"}]}],"affected":[{"vendor":"n/a","product":"O2OA","versions":[{"version":"9.0","status":"affected"}],"modules":["HTTP POST Request Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in O2OA up to 9.0.0. This impacts an unknown function of the file /x_program_center/jaxrs/mpweixin/check of the component HTTP POST Request Handler. The manipulation leads to xml external entity reference. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-06T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-06T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-08T15:08:13.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"sourbyte (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.344640","name":"VDB-344640 | O2OA HTTP POST Request check xml external entity reference","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.344640","name":"VDB-344640 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.745486","name":"Submit #745486 | 浙江兰德纵横网络技术股份有限公司 O2OA v6.1.0 至 v9.0.0 XML实体注入漏洞","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.745489","name":"Submit #745489 | O2OA开发平台 O2OA v6.1.0 至 v9.0.0 XML实体注入漏洞 (Duplicate)","tags":["third-party-advisory"]},{"url":"https://github.com/SourByte05/SourByte-Lab/issues/7","tags":["exploit","issue-tracking"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-10T15:24:33.129817Z","id":"CVE-2026-2074","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-10T15:24:44.981Z"}}]}}