Description
The OOXML parsing of the file indexer does not disable external entity resolution. A crafted xlsx or pptx document placed in an indexed directory can cause local files to be read or outbound HTTP requests to be performed, with the retrieved content being written to the search index.
Published: 2026-05-19
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An XML External Entity (XXE) vulnerability exists in the OOXML parsing component of the Faceted Search extension. The parser fails to disable external entity resolution, so an attacker can embed malicious entity references in a crafted xlsx or pptx file. When the extension indexes such a document, the entity resolution can cause local files to be read or outbound HTTP requests to be performed. The retrieved data is then written into the search index, potentially leaking sensitive information.

Affected Systems

The vulnerability applies to the TYPO3 extension "Faceted Search". No specific version information is provided in the advisory, and the scope covers any installation where the extension is enabled and users can place OOXML documents in directories that are subject to indexing.

Risk and Exploitability

The CVSS score of 5.9 indicates moderate severity. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog, which suggests no confirmed exploits are in circulation. The likely attack vector involves an attacker who can upload or place a malicious OOXML document into an indexed directory or who can otherwise influence the contents that the extension processes. If successful, the attacker can read arbitrary local files or trigger external HTTP requests, leading to information disclosure through the search index. Since no official patch or workaround is currently provided by the vendor according to the advisory, the risk remains present until an update is applied or mitigated by configuration changes.

Generated by OpenCVE AI on May 19, 2026 at 11:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Faceted Search extension to the latest vendor release that resolves XXE handling
  • If the vendor release is not yet available, disable external entity resolution in the OOXML parser or block external entity handling configuration
  • Remove or quarantine any indexed directories that may contain untrusted xlsx or pptx files, and reindex the search data after cleaning

Generated by OpenCVE AI on May 19, 2026 at 11:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Typo3
Typo3 extension "faceted Search"
Vendors & Products Typo3
Typo3 extension "faceted Search"

Tue, 19 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 19 May 2026 10:15:00 +0000

Type Values Removed Values Added
Description The OOXML parsing of the file indexer does not disable external entity resolution. A crafted xlsx or pptx document placed in an indexed directory can cause local files to be read or outbound HTTP requests to be performed, with the retrieved content being written to the search index.
Title XML External Entity Injection in extension "Faceted Search" (ke_search)
Weaknesses CWE-611
References
Metrics cvssV4_0

{'score': 5.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N'}


Subscriptions

Typo3 Extension "faceted Search"
cve-icon MITRE

Status: PUBLISHED

Assigner: TYPO3

Published:

Updated: 2026-05-19T13:30:04.573Z

Reserved: 2026-05-16T09:55:27.478Z

Link: CVE-2026-46722

cve-icon Vulnrichment

Updated: 2026-05-19T13:29:57.253Z

cve-icon NVD

Status : Deferred

Published: 2026-05-19T10:16:25.027

Modified: 2026-05-19T14:47:13.200

Link: CVE-2026-46722

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T10:39:37Z

Weaknesses