XML Injection RCE by parse http sitemap xml response vulnerability in Apache HertzBeat.












The attacker needs to have an authenticated account with access, and add monitor parsed by xml, returned special content can trigger the XML parsing vulnerability.

This issue affects Apache HertzBeat (incubating): before 1.7.0.

Users are recommended to upgrade to version 1.7.0, which fixes the issue.
History

Tue, 09 Sep 2025 09:45:00 +0000

Type Values Removed Values Added
Description XML Injection RCE by parse http sitemap xml response vulnerability in Apache HertzBeat. The attacker needs to have an authenticated account with access, and add monitor parsed by xml, returned special content can trigger the XML parsing vulnerability. This issue affects Apache HertzBeat (incubating): before 1.7.0. Users are recommended to upgrade to version 1.7.0, which fixes the issue.
Title Apache HertzBeat (incubating): RCE by parse http sitemap xml response
Weaknesses CWE-91
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-09-09T09:30:59.424Z

Reserved: 2025-01-21T14:41:26.279Z

Link: CVE-2025-24404

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-09T10:15:33.087

Modified: 2025-09-09T10:15:33.087

Link: CVE-2025-24404

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.