CVE-2026-2536

6.3 MEDIUM
XXE

📋 TL;DR

This vulnerability in opencc JFlow's workflow engine allows XML External Entity (XXE) attacks through manipulation of file arguments. Attackers can remotely exploit this to read sensitive files from the server or potentially cause denial of service. Organizations using JFlow up to version 20260129 are affected.

💻 Affected Systems

Products:
  • opencc JFlow
Versions: Up to and including 20260129
Operating Systems: All platforms running Java
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Workflow Engine component specifically in the Imp_Done function.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through file disclosure, potential remote code execution via XXE, and data exfiltration.

🟠

Likely Case

Unauthorized reading of sensitive server files (configuration files, credentials, source code) leading to information disclosure.

🟢

If Mitigated

Limited impact with proper XML parser configuration and network segmentation.

🌐 Internet-Facing: HIGH - Attack can be initiated remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this for lateral movement.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit has been publicly disclosed and may be utilized. The vulnerability is in a publicly accessible workflow administration endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

No official patch available. Monitor the project repository for updates. Consider applying workarounds or migrating to alternative solutions.

🔧 Temporary Workarounds

Disable XXE in XML parser

all

Configure XML parser to disable external entity processing

Modify Java code to use: DocumentBuilderFactory dbf = DocumentBuilderFactory.newInstance(); dbf.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); dbf.setFeature("http://xml.org/sax/features/external-general-entities", false); dbf.setFeature("http://xml.org/sax/features/external-parameter-entities", false);

Input validation and sanitization

all

Implement strict validation of file parameter inputs

Add input validation in WF_Admin_AttrFlow.java to reject XML content with DOCTYPE declarations or external entity references

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to JFlow administration interfaces
  • Deploy web application firewall (WAF) with XXE protection rules

🔍 How to Verify

Check if Vulnerable:

Check if JFlow version is 20260129 or earlier. Review WF_Admin_AttrFlow.java for vulnerable XML parsing without XXE protection.

Check Version:

Check JFlow version in application configuration or deployment files

Verify Fix Applied:

Test with XXE payloads to confirm file disclosure is prevented. Verify XML parser configuration disables external entities.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns from workflow engine
  • XML parsing errors with external entity references
  • Large outbound data transfers from JFlow server

Network Indicators:

  • HTTP requests to WF_Admin_AttrFlow endpoint with XML payloads containing DOCTYPE declarations
  • Unusual file:// or http:// references in XML requests

SIEM Query:

source="jflow" AND (message="DOCTYPE" OR message="ENTITY" OR message="SYSTEM")

🔗 References

📤 Share & Export