CVE-2025-65868

7.5 HIGH

📋 TL;DR

This XML external entity (XXE) injection vulnerability in eyoucms v1.7.1 allows remote attackers to cause denial of service by sending specially crafted POST requests. Attackers can exploit this to crash the application or potentially read sensitive files. All systems running the vulnerable version are affected.

💻 Affected Systems

Products:
  • eyoucms
Versions: v1.7.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with XML parsing enabled and accepting POST requests to vulnerable endpoints.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application unavailability, potential sensitive file disclosure, and server resource exhaustion leading to system instability.

🟠

Likely Case

Application denial of service causing downtime and disruption to website functionality.

🟢

If Mitigated

Minimal impact with proper XML parsing configuration and input validation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted XML in POST requests to vulnerable endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://github.com/weng-xianhu/eyoucms/issues/66

Restart Required: Yes

Instructions:

1. Monitor the GitHub issue for official patch. 2. Apply patch when available. 3. Restart the application service.

🔧 Temporary Workarounds

Disable XML external entity processing

all

Configure XML parser to disable external entity resolution

Modify XML parser configuration to set: feature_external_ges = false, feature_external_pes = false

Input validation and sanitization

all

Implement strict input validation for XML content

Add XML schema validation and sanitize all XML input before processing

🧯 If You Can't Patch

  • Implement WAF rules to block XXE patterns in POST requests
  • Restrict access to vulnerable endpoints using network ACLs

🔍 How to Verify

Check if Vulnerable:

Test by sending crafted XML with external entity references in POST requests to application endpoints

Check Version:

Check eyoucms version in admin panel or configuration files

Verify Fix Applied:

Verify XML parser configuration disables external entities and test with XXE payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests with XML content, application crash logs, increased error rates

Network Indicators:

  • POST requests containing XML with DOCTYPE declarations or external entity references

SIEM Query:

source="web_logs" AND method="POST" AND (body="<!DOCTYPE" OR body="SYSTEM" OR body="ENTITY")

🔗 References

📤 Share & Export