CVE-2020-10683

high-risk
Published 2020-05-01

dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j.

Do I need to act?

~
7.0% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 177069f0e96a40ddab5ab7f41519ec29e5a39652, 7fbdc6d58623ec0b54b9b44a4738781b65191df1, a8228522a99a02146106672a34c104adbda5c658
9
CVSS 9.8/10 Critical
NETWORK / LOW complexity
69
/ 100
high-risk
Severity 32/34 · Critical
Exploitability 9/34 · Low
Exposure 28/34 · Critical