CVE-2026-6501
MEDIUM
5,3
Source: 64c5ae8f-7972-4697-86a0-7ada793ac795
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
Description
AI Translation Available
Improper restriction of XML external entity reference vulnerability in ILM Informatique jOpenDocument allows Data Serialization External Entities Blowup.
This issue affects jOpenDocument: 1.5.
611
Improper Restriction of XML External Entity Reference
DraftCommon Consequences
Security Scopes Affected:
Confidentiality
Integrity
Availability
Potential Impacts:
Read Application Data
Read Files Or Directories
Bypass Protection Mechanism
Dos: Resource Consumption (Cpu)
Dos: Resource Consumption (Memory)
Applicable Platforms
Languages:
Not Language-Specific, XML
Technologies:
Not Technology-Specific, Web Based
https://www.jopendocument.org/documentation.html