Description
Improper Restriction of XML External Entity Reference vulnerability in Connext Professional (Core Libraries) allows Serialized Data External Linking.This issue affects Connext Professional: from 7.4.0 before 7.7.0, from 7.0.0 before 7.3.1.1, from 6.1.0 before 6.1.*, from 6.0.0 before 6.0.*, from 5.3.0 before 5.3.*, from 4.3x before 5.2.*.
Published: 2026-04-30
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Connext Professional Core Libraries expose an improper restriction on XML External Entity references, enabling serialized data external linking. The vulnerability can be exploited by supplying malicious XML that references external resources, potentially allowing an attacker to read arbitrary files or network content. While it does not directly lead to code execution, the exposed data could be used for further attacks, and based on the description, it is inferred that in some configurations could result in remote code execution. The weakness is identified as CWE-611, representing a failure to validate and restrict XML external entities.

Affected Systems

The affected vendor is RTI Connext Professional. The vulnerability impacts versions including 7.4.0 through 7.6.x, 7.0.0 through 7.3.1.0, 6.1.x, 6.0.x, 5.3.x, and 4.3x through 5.1.x. Specifically, versions 7.4.0 up to but not including 7.7.0; 7.0.0 up to 7.3.1.1; 6.1.0 up to any 6.1.*; 6.0.0 up to any 6.0.*; 5.3.0 up to any 5.3.*; and 4.3x up to 5.2.* are affected.

Risk and Exploitability

The CVSS score of 6.9 indicates a medium severity. The EPSS score is not available, and the vulnerability is not listed in CISA KEV. The likely attack vector is via an application or service that processes XML input using the Connext libraries. An attacker can craft XML that instructs the parser to fetch external entities; if the system allows such requests, sensitive information may be exfiltrated. The lack of a published exploit does not eliminate risk, given the potential for data disclosure and the medium severity score.

Generated by OpenCVE AI on May 2, 2026 at 00:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Connext Professional to the latest patched versions (e.g., 7.7.0 or later, 7.3.1.1 or later, etc.) that address the XEE issue.
  • Configure the XML parser to disallow or ignore external entity references, ensuring that all XML input is processed without external network or file lookups.
  • Validate and sanitize all XML input sources, rejecting untrusted or externally sourced XML content before it reaches the Connext libraries.

Generated by OpenCVE AI on May 2, 2026 at 00:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}


Thu, 30 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
Description Improper Restriction of XML External Entity Reference vulnerability in Connext Professional (Core Libraries) allows Serialized Data External Linking.This issue affects Connext Professional: from 7.4.0 before 7.7.0, from 7.0.0 before 7.3.1.1, from 6.1.0 before 6.1.*, from 6.0.0 before 6.0.*, from 5.3.0 before 5.3.*, from 4.3x before 5.2.*.
Title Improper Restriction of XML External Entity Reference vulnerability in Connext Professional (Core Libraries) allows Serialized Data External Linking.
First Time appeared Rti
Rti connext Professional
Weaknesses CWE-611
CPEs cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*
Vendors & Products Rti
Rti connext Professional
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Rti Connext Professional
cve-icon MITRE

Status: PUBLISHED

Assigner: RTI

Published:

Updated: 2026-04-30T15:42:40.955Z

Reserved: 2025-12-11T15:00:13.943Z

Link: CVE-2025-14543

cve-icon Vulnrichment

Updated: 2026-04-30T15:42:18.952Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-30T16:16:40.420

Modified: 2026-05-04T13:02:38.027

Link: CVE-2025-14543

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T00:30:16Z

Weaknesses