CycloneDX Core (Java): BOM validation is vulnerable to XML External Entity injection
High severity
GitHub Reviewed
Published
Nov 10, 2025
in
CycloneDX/cyclonedx-core-java
•
Updated Nov 10, 2025
Package
Affected versions
>= 2.1.0, < 11.0.1
Patched versions
11.0.1
Description
Published to the GitHub Advisory Database
Nov 10, 2025
Reviewed
Nov 10, 2025
Last updated
Nov 10, 2025
Impact
The XML
Validatorused by cyclonedx-core-java was not configured securely, making the library vulnerable to XML External Entity (XXE) injection.The fix for GHSA-683x-4444-jxh8 / CVE-2024-38374 has been incomplete in that it only fixed parsing of XML BOMs, but not validation.
Patches
The vulnerability has been fixed in cyclonedx-core-java version 11.0.1.
Workarounds
If feasible, applications can reject XML documents before handing them to cyclonedx-core-java for validation.
This may be an option if incoming CycloneDX BOMs are known to be in JSON format.
References
References