Description
Pachno 1.0.6 contains an XML external entity injection vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting unsafe XML parsing in the TextParser helper. Attackers can inject malicious XML entities through wiki table syntax and inline tags in issue descriptions, comments, and wiki articles to trigger entity resolution via simplexml_load_string() without LIBXML_NONET restrictions.
Published: 2026-04-13
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary file read via XML external entity injection
Action: Immediate Patch
AI Analysis

Impact

Pachno version 1.0.6 parses XML content in wiki pages without restricting external entity resolution, allowing an attacker to craft malicious XML that causes the system to read arbitrary files. This vulnerability is enabled by the TextParser helper when processing wiki table syntax or inline tags in issue descriptions, comments, and wiki articles. The resulting file disclosure can expose sensitive data such as configuration files, passwords, or code, thereby compromising confidentiality and potentially enabling further attacks. The weakness corresponds to CWE-403, representing an XML External Entity Injection scenario.

Affected Systems

The affected product is Pachno 1.0.6 from the vendor Pancho. No other versions or vendor information is listed. Users running this specific release are susceptible to the described exploitation when they use the wiki or issue tracking features.

Risk and Exploitability

The vulnerability has a CVSS score of 9.3, indicating a high risk of exploitation. Exploit Probability System Score is not available, and the issue is not currently tracked in the CISA Known Exploited Vulnerabilities catalog. The likely attack vector is client‑initiated XML submission through the wiki interface, with no authentication required for the read operation. Because the vulnerability can expose arbitrary files on the server, the attack surface includes potential theft of credentials, configuration data, or other sensitive information. The impact is limited to confidentiality; there is no direct evidence of code execution or disruption of service from the available information.

Generated by OpenCVE AI on April 13, 2026 at 19:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check Pachno vendor site for an updated version beyond 1.0.6 and apply the patch if available. If an update cannot be applied immediately, disable XML external entity support in the TextParser configuration or restrict wiki input parsing to trusted users. Consider blocking unauthenticated access to wiki pages or issue content until the vulnerability is resolved.

Generated by OpenCVE AI on April 13, 2026 at 19:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description Pachno 1.0.6 contains an XML external entity injection vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting unsafe XML parsing in the TextParser helper. Attackers can inject malicious XML entities through wiki table syntax and inline tags in issue descriptions, comments, and wiki articles to trigger entity resolution via simplexml_load_string() without LIBXML_NONET restrictions.
Title Pachno 1.0.6 Wiki TextParser XML External Entity Injection
First Time appeared Pachno
Pachno pachno
Weaknesses CWE-403
CPEs cpe:2.3:a:pachno:pachno:1.0.6:*:*:*:*:*:*:*
Vendors & Products Pachno
Pachno pachno
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-14T16:29:11.810Z

Reserved: 2026-04-08T13:39:22.100Z

Link: CVE-2026-40042

cve-icon Vulnrichment

Updated: 2026-04-14T15:27:04.843Z

cve-icon NVD

Status : Received

Published: 2026-04-13T19:16:51.960

Modified: 2026-04-13T19:16:51.960

Link: CVE-2026-40042

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:33:38Z

Weaknesses