Description
A local file disclosure vulnerability in the XInclude processing component of Inkscape 1.1 before 1.3 allows a remote attacker to read local files via a crafted SVG file containing malicious xi:include tags.
Published: 2026-03-27
Score: 6.3 Medium
EPSS: n/a
KEV: No
Impact: Local File Disclosure
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an XML External Entity (XEE) flaw in the XInclude processing component of Inkscape, enabling an attacker to embed xi:include tags in a crafted SVG file that causes the application to expose local file contents. This flaw permits the attacker to read protected files from the victim’s file system, compromising confidentiality and potentially exposing sensitive data. The weakness is classified as CWE-611, an improper restriction of XML external entity references.

Affected Systems

Users running Inkscape versions prior to 1.3, including 1.1 and 1.2, are affected. The vulnerability is specific to the Inkscape application by the Inkscape team. Upgrading to Inkscape 1.3 or later removes the XInclude component that processes malicious xi:include tags, thereby mitigating the vulnerability.

Risk and Exploitability

The CVSS base score of 6.3 indicates moderate severity. Although no EPSS score is available, the flaw requires the attacker to supply a malicious SVG file, which the victim must open in Inkscape. Because this attack vector depends on local user interaction and the absence of a remote code execution capability, the likelihood of widespread exploitation remains lower than high-impact vulnerabilities. The vulnerability is not listed in the CISA KEV catalog, and no public proof‑of‑concept exploits have been reported. Nonetheless, organizations should treat it as a moderate risk and apply the available patch promptly.

Generated by OpenCVE AI on March 27, 2026 at 16:21 UTC.

Remediation

Vendor Solution

Upgrade to version 1.3 or above


OpenCVE Recommended Actions

  • Upgrade Inkscape to version 1.3 or newer.
  • Verify that the installed Inkscape version matches the updated release.
  • If an upgrade is not immediately possible, avoid opening SVG files from untrusted sources.

Generated by OpenCVE AI on March 27, 2026 at 16:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Description A local file disclosure vulnerability in the XInclude processing component of Inkscape 1.1 before 1.3 allows a remote attacker to read local files via a crafted SVG file containing malicious xi:include tags.
Title Improper Restriction of XML External Entity Reference in Inkscape
Weaknesses CWE-611
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2026-03-27T14:50:48.271Z

Reserved: 2026-03-27T11:18:24.287Z

Link: CVE-2026-4980

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-27T15:17:03.790

Modified: 2026-03-27T15:17:03.790

Link: CVE-2026-4980

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T20:28:23Z

Weaknesses