Impact
The vulnerability in the Imp_Done function of opencc JFlow allows an attacker to craft an XML payload that triggers an external entity reference. This type of XML External Entity (XXE) flaw can expose internal files, allow remote code execution, or cause denial‑of‑service by exhausting resources. The associated CWE identifiers 610 and 611 reflect improper access controls and external entity handling, underscoring the potential for serious information disclosure or code execution.
Affected Systems
The flaw exists in the opencc JFlow Workflow Engine, specifically in the WF_Admin_AttrFlow.java file, with affected releases up to 20260129. No specific patch version is indicated, so any deployment of the vulnerable component prior to the release of a fix remains at risk.
Risk and Exploitability
The CVSS score of 5.3 places the vulnerability in the medium severity range. The EPSS score of less than 1% indicates a very low but nonzero likelihood of exploitation, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires a remotely submitted XML document that invokes the File argument in the impacted function. Because the flaw is web‑exposed, an attacker could drive the application to process the crafted XML from an external source, thereby activating the XXE vulnerability.
OpenCVE Enrichment