Impact
An improper restriction of XML external entity references in ILM Informatique jOpenDocument permits crafted XML to cause a blowup during data serialization, leading to excessive memory consumption or application failure. This weakness is classified as CWE-611 and can degrade the availability of services that rely on this library.
Affected Systems
The affected product is ILM Informatique jOpenDocument version 1.5. No other versions or products were indicated in the data.
Risk and Exploitability
The CVSS score of 5.3 signals moderate severity. EPSS data is not provided and the vulnerability is not listed in CISA's KEV catalog, indicating no known exploitation at large scale. Based on the description, the likely attack vector is an attacker providing malicious XML input to an application that uses jOpenDocument for parsing or serialization. The attack requires that the application processes untrusted XML, which may or may not need privileged access. The risk is primarily a DoS impact rather than code execution or data compromise.
OpenCVE Enrichment