Description
Improper Restriction of XML External Entity Reference vulnerability in XMLUtils.java in Slovensko.Digital Autogram allows remote unauthenticated attacker to conduct SSRF (Server Side Request Forgery) attacks and obtain unauthorized access to local files on filesystems running the vulnerable application. Successful exploitation requires the victim to visit a specially crafted website that sends request containing a specially crafted XML document to /sign endpoint of the local HTTP server run by the application.
Published: 2026-03-19
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Server Side Request Forgery and Local File Disclosure
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an improper restriction of XML External Entity (XXE) processing in the XMLUtils.java component of Slovensko.Digital Autogram. It allows a remote, unauthenticated attacker to send a specially crafted XML document to the /sign endpoint, causing the application to resolve external entities. This can lead to server‑side request forgery (SSRF) and unauthorized reading of local files on the host system. The primary weaknesses involved are classified under CWE‑611, indicating the processing of untrusted XML input that permits external entity resolution.

Affected Systems

Affected systems are instances of the Slovensko.Digital Autogram application. The provided data does not specify exact affected versions, but the vulnerability is present in the code used by the application’s /sign functionality. A patch is referenced in release v2.7.2 of Autogram, yet the description does not confirm that the patch fully resolves the issue. Administrators should verify whether their deployed version includes the fix identified in the v2.7.2 release.

Risk and Exploitability

The CVSS base score of 8.6 places this flaw in the high‑severity range, indicating significant potential impact if exploited. EPSS information is not available, and the vulnerability is not listed in the CISA KEV catalog. The attack requires the victim to visit a malicious website that serves the custom XML payload, implying a user‑interaction vector. Once executed, the attacker can target internal resources and read sensitive files, presenting a considerable confidentiality risk.

Generated by OpenCVE AI on March 19, 2026 at 12:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Autogram to the latest released version (e.g., v2.7.2) to obtain the vendor’s fix.
  • If an update is not immediately possible, restrict or disable the /sign endpoint for unauthenticated access and configure the application to reject external XML entity references.
  • Apply network segmentation or firewall rules to prevent the application from initiating outbound connections to untrusted hosts, mitigating SSF potential.

Generated by OpenCVE AI on March 19, 2026 at 12:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Title Unrestricted XML External Entity Enables SSRF and Local File Disclosure in Slovensko.Digital Autogram

Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Slovensko.digital
Slovensko.digital autogram
Vendors & Products Slovensko.digital
Slovensko.digital autogram

Thu, 19 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 11:45:00 +0000

Type Values Removed Values Added
Description Improper Restriction of XML External Entity Reference vulnerability in XMLUtils.java in Slovensko.Digital Autogram allows remote unauthenticated attacker to conduct SSRF (Server Side Request Forgery) attacks and obtain unauthorized access to local files on filesystems running the vulnerable application. Successful exploitation requires the victim to visit a specially crafted website that sends request containing a specially crafted XML document to /sign endpoint of the local HTTP server run by the application.
Weaknesses CWE-611
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Slovensko.digital Autogram
cve-icon MITRE

Status: PUBLISHED

Assigner: SK-CERT

Published:

Updated: 2026-03-19T13:15:06.878Z

Reserved: 2026-03-04T10:42:40.045Z

Link: CVE-2026-3511

cve-icon Vulnrichment

Updated: 2026-03-19T13:15:02.806Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-19T12:16:18.647

Modified: 2026-03-19T13:25:00.570

Link: CVE-2026-3511

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:15:03Z

Weaknesses