CVE-2025-13209

6.3 MEDIUM
XXE

📋 TL;DR

This CVE describes an XML External Entity (XXE) vulnerability in bestfeng oa_git_free software up to version 9.5. Attackers can exploit this remotely to read sensitive files from the server or potentially cause denial of service. Organizations using affected versions of this office automation system are at risk.

💻 Affected Systems

Products:
  • bestfeng oa_git_free
Versions: up to 9.5
Operating Systems: Any OS running Java applications
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the workflow predefine controller component handling XML input

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attackers could read sensitive server files (including configuration files, passwords), perform server-side request forgery, or cause denial of service through entity expansion attacks.

🟠

Likely Case

Attackers exfiltrate sensitive configuration data, user information, or internal files from the compromised server.

🟢

If Mitigated

With proper input validation and XML parser configuration, the attack would be blocked at the application layer.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit documentation exists and remote exploitation is possible without authentication

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check vendor for updates beyond version 9.5
2. Apply any available patches
3. Restart the application server
4. Verify the fix by testing XXE payloads

🔧 Temporary Workarounds

Disable XXE in XML parser

all

Configure XML parsers to disable external entity processing

Set XML parser properties: FEATURE_SECURE_PROCESSING = true, DISALLOW_DOCTYPE_DECL = true

Input validation filter

all

Implement input validation to reject XML containing DOCTYPE declarations

Add input filter to reject requests containing '<!DOCTYPE' or '<!ENTITY' patterns

🧯 If You Can't Patch

  • Implement WAF rules to block XML containing DOCTYPE or external entity declarations
  • Network segmentation to restrict access to vulnerable systems

🔍 How to Verify

Check if Vulnerable:

Test with XXE payload: Send XML containing external entity reference to the vulnerable endpoint and check for file read or error responses

Check Version:

Check application version in admin interface or configuration files

Verify Fix Applied:

Attempt the same XXE payload after fixes - should receive error or rejection instead of file content

📡 Detection & Monitoring

Log Indicators:

  • XML parsing errors
  • Unusual file access patterns from application
  • Large XML payloads in requests

Network Indicators:

  • HTTP requests containing XML with DOCTYPE declarations
  • Outbound connections to external URLs from application server

SIEM Query:

source="web_server" AND (message="*DOCTYPE*" OR message="*ENTITY*")

🔗 References

📤 Share & Export