trigger improper handling of XML input, which may result in unintended
exposure of sensitive information. The flaw stems from insufficient
hardening of the XML parsing process.
No analysis available yet.
Vendor Workaround
NSA has indicated that the GRASSMARLIN project has reached end-of-life status as of 2017 and is no longer supported. The project is archived, and no patches or further updates are planned or expected.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 28 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in GRASSMARLIN v3.2.1 allows crafted session data to trigger improper handling of XML input, which may result in unintended exposure of sensitive information. The flaw stems from insufficient hardening of the XML parsing process. | |
| Title | NSA GRASSMARLIN Improper Restriction of XML External Entity Reference | |
| Weaknesses | CWE-611 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-04-28T17:41:13.480Z
Reserved: 2026-04-21T16:01:40.334Z
Link: CVE-2026-6807
No data.
Status : Awaiting Analysis
Published: 2026-04-28T19:37:47.773
Modified: 2026-04-28T20:10:23.367
Link: CVE-2026-6807
No data.
OpenCVE Enrichment
No data.