Impact
This vulnerability occurs when a crafted XML payload is submitted via a POST request to the /x_program_center/jaxrs/mpweixin/check endpoint, allowing the attacker to inject an XML external entity reference. The injected entity may reference external resources or memory, potentially exposing sensitive data, and can lead to server side request forgery or denial of service. The weakness corresponds to CWE‑610 (Improper Restriction of XML External Entity Reference) and CWE‑611 (XML External Entity Injection).
Affected Systems
O2OA versions up to 9.0.0 are affected. The flaw resides in the HTTP POST Request Handler for the /x_program_center/jaxrs/mpweixin/check function. The vendor is O2OA under the Zoneland umbrella.
Risk and Exploitability
The CVSS score is 5.3, indicating moderate severity, and the EPSS score is less than 1 %, suggesting a low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog, and the exploit code is publicly available. Attackers can trigger the flaw remotely over the network by sending a malicious XML payload to the exposed endpoint; no special privileges or additional conditions are required beyond network connectivity.
OpenCVE Enrichment