Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 30 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 30 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in beecue FastBee up to 2.1. Impacted is the function getRootElement of the file springboot/fastbee-server/sip-server/src/main/java/com/fastbee/sip/handler/req/ReqAbstractHandler.java of the component SIP Message Handler. The manipulation results in xml external entity reference. It is possible to launch the attack remotely. A high complexity level is associated with this attack. The exploitability is considered difficult. The project owner replied to the issue report: "Okay, we'll handle it as soon as possible." | |
| Title | beecue FastBee SIP Message ReqAbstractHandler.java getRootElement xml external entity reference | |
| Weaknesses | CWE-610 CWE-611 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-12-30T14:29:30.146Z
Reserved: 2025-12-29T09:08:25.743Z
Link: CVE-2025-15251
Updated: 2025-12-30T14:29:24.776Z
Status : Received
Published: 2025-12-30T14:15:53.130
Modified: 2025-12-30T14:15:53.130
Link: CVE-2025-15251
No data.
OpenCVE Enrichment
No data.