Description
An XML external entity (XXE) vulnerability in the /designer/loadReport endpoint of SpringBlade v4.8.0 allows authenticated attackers to execute arbitrary code via injecting a crafted payload.
Published: 2026-04-30
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An XML external entity (XXE) flaw in the /designer/loadReport endpoint of SpringBlade v4.8.0 lets authenticated users supply crafted XML that can resolve external entities at the server, enabling arbitrary code execution on the host. The vulnerability stems from the XML parser re‑allowing external entity resolution, a classic CWE‑611 weakness. The attacker can execute commands or exploit the server environment, compromising confidentiality, integrity, or availability of data and services.

Affected Systems

SpringBlade version 4.8.0 is affected. No additional vendor or product information is listed in the CVE entry.

Risk and Exploitability

The CVSS score is not provided and the EPSS is not available, so the precise severity and exploitation probability are unknown. The vulnerability is not listed in the CISA KEV catalog. Attackers must be authenticated and have access to the /designer/loadReport endpoint; they can then inject a malicious XML payload to achieve code execution. Because no exploit probability data is available, it is prudent to assume the risk is significant but unknown, and that mitigation steps should be taken promptly.

Generated by OpenCVE AI on May 1, 2026 at 05:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify which version of SpringBlade is deployed and determine if a newer release that addresses XXE is available.
  • If an update exists, install the latest version that resolves the XML parsing oversight.
  • Configure the XML parser used by SpringBlade to disable external entity resolution or to enforce the XXE protection policy described in the vendor documentation.
  • Restrict access to the /designer/loadReport endpoint to only those users who strictly require it, and consider network segmentation or firewall rules to limit exposure.

Generated by OpenCVE AI on May 1, 2026 at 05:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 01 May 2026 05:45:00 +0000

Type Values Removed Values Added
Title XXE Vulnerability in SpringBlade /designer/loadReport Enabling Arbitrary Code Execution
Weaknesses CWE-611

Thu, 30 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Chillzhuang
Chillzhuang springblade
Vendors & Products Chillzhuang
Chillzhuang springblade

Thu, 30 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description An XML external entity (XXE) vulnerability in the /designer/loadReport endpoint of SpringBlade v4.8.0 allows authenticated attackers to execute arbitrary code via injecting a crafted payload.
References

Subscriptions

Chillzhuang Springblade
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-30T17:41:37.361Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-36765

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-04-30T18:16:29.707

Modified: 2026-04-30T19:14:15.800

Link: CVE-2026-36765

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T05:30:09Z

Weaknesses