CVE-2024-52800: Potential XXE (XML External Entity Injection) vulnerability in veraPDF CLI

2.3 CVSS

Description

veraPDF is an open source PDF/A validation library. Executing policy checks using custom schematron files via the CLI invokes an XSL transformation that may theoretically lead to a remote code execution (RCE) vulnerability. This doesn't affect the standard validation and policy checks functionality, veraPDF's common use cases. Most veraPDF users don't insert any custom XSLT code into policy profiles, which are based on Schematron syntax rather than direct XSL transforms. For users who do, only load custom policy files from sources you trust. This issue has not yet been patched. Users are advised to be cautious of XSLT code until a patch is available.

Classification

CVE ID: CVE-2024-52800

CVSS Base Severity: LOW

CVSS Base Score: 2.3

Affected Products

Vendor: veraPDF

Product: veraPDF-library

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 11.44% (scored less or equal to compared to others)

EPSS Date: 2025-02-03 (when was this score calculated)

References

https://github.com/veraPDF/veraPDF-library/security/advisories/GHSA-4cx5-89vm-833x
https://github.com/veraPDF/veraPDF-library/issues/1488

Timeline