Description
OpenRemote is an open-source internet-of-things platform. Prior to version 1.22.0, the Velbus asset import path parses attacker-controlled XML without explicit XXE hardening. An authenticated user who can call the import endpoint may trigger XML external entity processing, which can lead to server-side file disclosure and SSRF. The target file must be less than 1023 characters. Version 1.22.0 fixes the issue.
Published: 2026-04-22
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery and file disclosure.
Action: Apply patch
AI Analysis

Impact

This vulnerability is an XML External Entity (XXE) flaw in the Velbus asset import feature of OpenRemote in versions prior to 1.22.0. An authenticated user who can call the import endpoint can supply crafted XML that triggers external entity resolution, enabling the server to read local files up to 1023 characters in length and to make arbitrary outbound HTTP requests (SSRF). This can lead to the disclosure of sensitive data or facilitate further exploitation of external services.

Affected Systems

The flaw affects all installations of OpenRemote that use a version earlier than 1.22.0. OpenRemote is an open‑source Internet‑of‑Things platform, and the affected component is the Velbus asset import endpoint. Any deployment that has integrated this feature without upgrading to 1.22.0 or later is vulnerable.

Risk and Exploitability

The CVSS score of 7.6 indicates high severity. Authentication is required to reach the vulnerable endpoint, so exploitation is limited to users with valid credentials. The EPSS metric is not available and the CVE is not listed in CISA KEV, suggesting no widespread public exploitation is known. Nonetheless, the combination of server‑side file read and SSRF could enable attackers to exfiltrate data or compromise external resources if they gain sufficient permission.

Generated by OpenCVE AI on April 27, 2026 at 08:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to OpenRemote 1.22.0 or newer, where the issue is fixed.
  • If an upgrade is not immediately possible, restrict access to the Velbus asset import endpoint to privileged users only and monitor for abnormal import activity.
  • As a temporary workaround, disable XML external entity support in the XML parser used by the import functionality until a vendor patch is applied.

Generated by OpenCVE AI on April 27, 2026 at 08:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-g24f-mgc3-jwwc OpenRemote has XXE in Velbus Asset Import
History

Fri, 24 Apr 2026 13:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:openremote:openremote:*:*:*:*:*:*:*:*

Thu, 23 Apr 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Openremote
Openremote openremote
Vendors & Products Openremote
Openremote openremote

Wed, 22 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description OpenRemote is an open-source internet-of-things platform. Prior to version 1.22.0, the Velbus asset import path parses attacker-controlled XML without explicit XXE hardening. An authenticated user who can call the import endpoint may trigger XML external entity processing, which can lead to server-side file disclosure and SSRF. The target file must be less than 1023 characters. Version 1.22.0 fixes the issue.
Title OpenRemote has XXE in Velbus Asset Import
Weaknesses CWE-611
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}


Subscriptions

Openremote Openremote
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-23T13:47:07.964Z

Reserved: 2026-04-15T15:57:41.719Z

Link: CVE-2026-40882

cve-icon Vulnrichment

Updated: 2026-04-23T13:47:04.000Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-22T21:17:08.733

Modified: 2026-04-24T13:24:32.900

Link: CVE-2026-40882

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T18:42:00Z

Weaknesses