CycloneDX Core (Java): BOM validation is vulnerable to XML External Entity injection
High severity
GitHub Reviewed
Published
Nov 10, 2025
in
CycloneDX/cyclonedx-core-java
•
Updated Nov 15, 2025
Package
Affected versions
>= 2.1.0, < 11.0.1
Patched versions
11.0.1
Description
Published to the GitHub Advisory Database
Nov 10, 2025
Reviewed
Nov 10, 2025
Published by the National Vulnerability Database
Nov 10, 2025
Last updated
Nov 15, 2025
Impact
The XML
Validatorused by cyclonedx-core-java was not configured securely, making the library vulnerable to XML External Entity (XXE) injection.The fix for GHSA-683x-4444-jxh8 / CVE-2024-38374 has been incomplete in that it only fixed parsing of XML BOMs, but not validation.
Patches
The vulnerability has been fixed in cyclonedx-core-java version 11.0.1.
Workarounds
If feasible, applications can reject XML documents before handing them to cyclonedx-core-java for validation.
This may be an option if incoming CycloneDX BOMs are known to be in JSON format.
References
References