Users are recommended to upgrade to version 3.2.5 which fixes the issue, or mitigate the issue by disabling DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable.
This issue has been disclosed before as CVE-2018-1311, but unfortunately that advisory incorrectly stated the issue would be fixed in version 3.2.3 or 3.2.4.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 22 Jan 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache xerces-c
|
|
| CPEs | cpe:2.3:a:apache:xerces-c:3.0.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache xerces-c
|
|
| Metrics |
cvssV3_1
|
ssvc
|
Thu, 16 Jan 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache xerces-c\+\+ |
|
| CPEs | cpe:2.3:a:apache:xerces-c\+\+:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache xerces-c\+\+ |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-01-22T04:55:53.687Z
Reserved: 2024-01-22T16:40:42.873Z
Link: CVE-2024-23807
Updated: 2024-08-01T23:13:08.245Z
Status : Analyzed
Published: 2024-02-29T01:44:10.340
Modified: 2025-01-16T17:51:40.503
Link: CVE-2024-23807
OpenCVE Enrichment
No data.