Impact
The vulnerability arises from insecure XML parser configuration in Apache CXF's WS-Transfer module, enabling XXE attacks. Based on the description, it is inferred that attackers could supply malicious XML to retrieve internal system files, trigger SSRF, or potentially execute arbitrary code, leading to compromise of confidentiality and integrity on the affected system.
Affected Systems
Apache CXF deployments that rely on older releases, specifically those preceding the fixed versions 4.2.1, 4.1.6, or 3.6.11, are impacted. Any application using these older versions in a web service environment is potentially vulnerable. Upgrading to the specified patched releases removes the weakness.
Risk and Exploitability
The CVSS score is 5.3, and EPSS information is unavailable, so the quantitative risk remains unclear. However, the official advisory notes that the flaw is present in the WS-Transfer functionality accessible to any client providing XML input. Based on the description, it is inferred that if the service is reachable from untrusted networks, the likelihood of exploitation is high. The vulnerability is not yet listed in the CISA KEV catalog, but it should still be regarded as a high‑risk flaw due to its potential to expose sensitive data or allow remote code execution.
OpenCVE Enrichment