CVE-2025-44044

7.5 HIGH
XXE

📋 TL;DR

Keyoti SearchUnit versions before 9.0.0 are vulnerable to XML External Entity (XXE) attacks. This allows attackers who can submit malicious XML/DTD files to read arbitrary files from the server's filesystem. Any organization using vulnerable SearchUnit versions is affected.

💻 Affected Systems

Products:
  • Keyoti SearchUnit
Versions: All versions prior to 9.0.0
Operating Systems: Windows, Linux, Any OS running SearchUnit
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments where SearchUnit processes XML input from untrusted sources.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server file system disclosure including sensitive configuration files, credentials, and system files leading to full system compromise.

🟠

Likely Case

Exfiltration of web application configuration files, source code, and sensitive data files accessible to the web server process.

🟢

If Mitigated

Limited file access restricted by web server permissions and network segmentation preventing lateral movement.

🌐 Internet-Facing: HIGH - Publicly accessible search endpoints can be directly targeted by external attackers.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XXE exploitation is well-documented and automated tools exist. The vulnerability requires XML parsing capability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.0.0

Vendor Advisory: https://keyoti.com/products/search/dotNetWeb/HtmlHelp9/?topic=UserGuide/Release%20Notes.htm

Restart Required: Yes

Instructions:

1. Download SearchUnit 9.0.0 or later from Keyoti. 2. Replace existing SearchUnit installation with patched version. 3. Restart the application/service. 4. Test XML parsing functionality.

🔧 Temporary Workarounds

Disable XXE in XML parser

all

Configure XML parser to disable external entity resolution

Set XmlReaderSettings.DtdProcessing = DtdProcessing.Prohibit
Set XmlReaderSettings.XmlResolver = null

Input validation and filtering

all

Filter or reject XML containing DOCTYPE declarations and external entity references

🧯 If You Can't Patch

  • Implement WAF rules to block XML containing DOCTYPE and external entity references
  • Network segmentation to isolate SearchUnit instances and restrict file system access

🔍 How to Verify

Check if Vulnerable:

Check SearchUnit version in application configuration or assembly info. Test with XXE payload: <?xml version="1.0"?><!DOCTYPE test [<!ENTITY xxe SYSTEM "file:///etc/passwd">]><test>&xxe;</test>

Check Version:

Check assembly version or consult application configuration files for SearchUnit version

Verify Fix Applied:

Attempt XXE exploitation after patch. Verify version is 9.0.0+. Test with same XXE payload should return error or empty result.

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML parsing errors
  • File access attempts from web process
  • Large XML payloads with DOCTYPE declarations

Network Indicators:

  • HTTP requests containing XML with DOCTYPE and SYSTEM entities
  • Outbound connections attempting to fetch external DTDs

SIEM Query:

source="web_logs" AND (xml OR dtd OR doctype) AND (file:// OR http:// OR ftp://) AND status=200

🔗 References

📤 Share & Export