Headline
GHSA-qpj9-qcwx-8jv2: PowSyBl Core XML Reader allows XXE and SSRF
Impact
What kind of vulnerability is it? Who is impacted?
In certain places, powsybl-core XML parsing is vulnerable to an XXE attack and in on place also to an SSRF attack.
This allows an attacker to elevate their privileges to read files that they do not have permissions to, including sensitive files on the system.
The vulnerable class is com.powsybl.commons.xml.XmlReader
which is considered to be untrusted in use cases where untrusted users can submit their XML to the vulnerable methods. This can be a multi-tenant application that hosts many different users perhaps with different privilege levels.
Am I impacted?
You are vulnerable if you allow untrusted users to import untrusted CGMES or XIIDM network files.
Patches
com.powsybl:powsybl-commons:6.7.2 and higher
References
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2025-47293
PowSyBl Core XML Reader allows XXE and SSRF
Low severity GitHub Reviewed Published Jun 19, 2025 in powsybl/powsybl-core • Updated Jun 19, 2025
Package
maven com.powsybl:powsybl-commons (Maven)
Affected versions
<= 6.7.1
Impact
What kind of vulnerability is it? Who is impacted?
In certain places, powsybl-core XML parsing is vulnerable to an XXE attack and in on place also to an SSRF attack.
This allows an attacker to elevate their privileges to read files that they do not have permissions to, including sensitive files on the system.
The vulnerable class is com.powsybl.commons.xml.XmlReader which is considered to be untrusted in use cases where untrusted users can submit their XML to the vulnerable methods. This can be a multi-tenant application that hosts many different users perhaps with different privilege levels.
Am I impacted?
You are vulnerable if you allow untrusted users to import untrusted CGMES or XIIDM network files.
Patches
com.powsybl:powsybl-commons:6.7.2 and higher
References
powsybl-core v6.7.2
References
- GHSA-qpj9-qcwx-8jv2
- powsybl/powsybl-core@e6c7c49
- https://github.com/powsybl/powsybl-core/releases/tag/v6.7.2
Published to the GitHub Advisory Database
Jun 19, 2025
Last updated
Jun 19, 2025