By leveraging this vulnerability, a malicious actor can read confidential files from the product's file system or access limited HTTP resources reachable via HTTP GET requests to the vulnerable product.
Project Subscriptions
No advisories yet.
Solution
Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2026/WSO2-2024-3581/#solution
Workaround
No workaround given by the vendor.
Thu, 16 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 16 Apr 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wso2 api Manager
|
|
| Vendors & Products |
Wso2 api Manager
|
Thu, 16 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The component accepts XML input through the publisher without disabling external entity resolution. This allows malicious actors to submit a crafted XML payload that exploits the unescaped external entity references. By leveraging this vulnerability, a malicious actor can read confidential files from the product's file system or access limited HTTP resources reachable via HTTP GET requests to the vulnerable product. | |
| Title | XML External Entity Injection via Publisher in WSO2 API Manager Allows Reading Arbitrary Files | |
| First Time appeared |
Wso2
Wso2 wso2 Api Manager |
|
| Weaknesses | CWE-611 | |
| CPEs | cpe:2.3:a:wso2:wso2_api_manager:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wso2
Wso2 wso2 Api Manager |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WSO2
Published:
Updated: 2026-04-16T12:30:36.466Z
Reserved: 2024-08-20T12:45:54.123Z
Link: CVE-2024-8010
Updated: 2026-04-16T12:19:59.812Z
Status : Received
Published: 2026-04-16T10:16:14.050
Modified: 2026-04-16T10:16:14.050
Link: CVE-2024-8010
No data.
OpenCVE Enrichment
Updated: 2026-04-16T12:30:05Z