CVE-2021-46365

7.8 HIGH
XXE

📋 TL;DR

This vulnerability in Magnolia CMS allows attackers to perform XML External Entity (XXE) attacks by uploading a malicious XLF file through the Export function. Attackers can potentially read sensitive files from the server, perform server-side request forgery, or cause denial of service. All Magnolia CMS installations version 6.2.3 and below are affected.

💻 Affected Systems

Products:
  • Magnolia CMS
Versions: v6.2.3 and below
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access to the Export function; typically authenticated users but could be exposed via other vectors.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise through arbitrary file read, SSRF leading to internal network reconnaissance, or denial of service via entity expansion attacks.

🟠

Likely Case

Sensitive file disclosure (configuration files, credentials), limited SSRF to internal services, or application disruption.

🟢

If Mitigated

Attack blocked at perimeter with file upload restrictions; minimal impact with proper XML parser configuration.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires crafting a malicious XLF file; public proof-of-concept available in GitHub disclosures.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Magnolia CMS 6.2.4

Vendor Advisory: https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory

Restart Required: Yes

Instructions:

1. Backup your Magnolia instance. 2. Download Magnolia CMS 6.2.4 or later. 3. Follow Magnolia upgrade procedures. 4. Restart the application server.

🔧 Temporary Workarounds

Disable External Entity Processing

all

Configure XML parser to disable external entity resolution in Magnolia configuration.

Set XML parser properties: FEATURE_SECURE_PROCESSING=true, disallow-doctype-decl=true

Restrict File Uploads

all

Implement strict file upload validation for XLF files in the Export function.

Configure file upload filters to validate/sanitize XLF content before processing

🧯 If You Can't Patch

  • Disable the Export function entirely if not required
  • Implement network segmentation and WAF rules to block malicious file uploads

🔍 How to Verify

Check if Vulnerable:

Check Magnolia version; if version is 6.2.3 or below, system is vulnerable.

Check Version:

Check Magnolia admin interface or configuration files for version number

Verify Fix Applied:

Verify Magnolia version is 6.2.4 or higher; test XXE payloads are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to Export endpoint
  • XML parsing errors with external entity references
  • Unexpected outbound connections from Magnolia server

Network Indicators:

  • HTTP requests with crafted XLF files to /magnoliaAuthor/.export
  • Outbound requests to internal IPs from Magnolia server

SIEM Query:

source="magnolia" AND (uri_path="/.export" OR message="XXE" OR message="External entity")

🔗 References

📤 Share & Export