Description
A vulnerability was determined in opencc JFlow up to 20260129. This affects the function Imp_Done of the file src/main/java/bp/wf/httphandler/WF_Admin_AttrFlow.java of the component Workflow Engine. This manipulation of the argument File causes xml external entity reference. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-02-16
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Assess Impact
AI Analysis

Impact

The vulnerability in the Imp_Done function of opencc JFlow allows an attacker to craft an XML payload that triggers an external entity reference. This type of XML External Entity (XXE) flaw can expose internal files, allow remote code execution, or cause denial‑of‑service by exhausting resources. The associated CWE identifiers 610 and 611 reflect improper access controls and external entity handling, underscoring the potential for serious information disclosure or code execution.

Affected Systems

The flaw exists in the opencc JFlow Workflow Engine, specifically in the WF_Admin_AttrFlow.java file, with affected releases up to 20260129. No specific patch version is indicated, so any deployment of the vulnerable component prior to the release of a fix remains at risk.

Risk and Exploitability

The CVSS score of 5.3 places the vulnerability in the medium severity range. The EPSS score of less than 1% indicates a very low but nonzero likelihood of exploitation, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires a remotely submitted XML document that invokes the File argument in the impacted function. Because the flaw is web‑exposed, an attacker could drive the application to process the crafted XML from an external source, thereby activating the XXE vulnerability.

Generated by OpenCVE AI on April 18, 2026 at 12:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the opencc JFlow project page and vendor communications for a patched release or security update.
  • If no fix is available, immediately disable external entity processing in the XML parser used by WF_Admin_AttrFlow or restrict DOCTYPE declarations.
  • Implement strict input validation or schema enforcement on the File argument so that only trusted, well‑formed XML is accepted, and log and monitor for attempts to submit malformed XML payloads.

Generated by OpenCVE AI on April 18, 2026 at 12:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Opencc
Opencc jflow
Vendors & Products Opencc
Opencc jflow

Mon, 16 Feb 2026 05:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in opencc JFlow up to 20260129. This affects the function Imp_Done of the file src/main/java/bp/wf/httphandler/WF_Admin_AttrFlow.java of the component Workflow Engine. This manipulation of the argument File causes xml external entity reference. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
Title opencc JFlow Workflow WF_Admin_AttrFlow.java Imp_Done xml external entity reference
Weaknesses CWE-610
CWE-611
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:05:58.889Z

Reserved: 2026-02-15T09:19:07.190Z

Link: CVE-2026-2536

cve-icon Vulnrichment

Updated: 2026-02-17T17:05:12.379Z

cve-icon NVD

Status : Deferred

Published: 2026-02-16T06:16:22.063

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2536

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T12:15:15Z

Weaknesses