Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Slack’s AI search now works across an organization’s entire knowledge base

      July 17, 2025

      In-House vs Outsourcing for React.js Development: Understand What Is Best for Your Enterprise

      July 17, 2025

      Tiny Screens, Big Impact: The Forgotten Art Of Developing Web Apps For Feature Phones

      July 16, 2025

      Kong AI Gateway 3.11 introduces new method for reducing token costs

      July 16, 2025

      Researchers from OpenAI, Anthropic, Meta, and Google issue joint AI safety warning – here’s why

      July 17, 2025

      You’ll soon be able to chat with Copilot and attend Teams meetings while driving your Mercedes-Benz — now there’s no excuse to miss your meetings

      July 17, 2025

      Intel is laying off thousands of US workers in AI restructuring — CEO Lip-Bu Tan says it’s “too late” to catch up with the competition

      July 17, 2025

      Elon Musk says “We need more babies” — then creates digital girlfriends so you actually won’t go out and make any babies

      July 17, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      July 17, 2025
      Recent

      The details of TC39’s last meeting

      July 17, 2025

      Perficient Honored as a 2025 Technology Top Workplaces Winner

      July 17, 2025

      PHP 8.5.0 Alpha 2 available for testing

      July 17, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      You’ll soon be able to chat with Copilot and attend Teams meetings while driving your Mercedes-Benz — now there’s no excuse to miss your meetings

      July 17, 2025
      Recent

      You’ll soon be able to chat with Copilot and attend Teams meetings while driving your Mercedes-Benz — now there’s no excuse to miss your meetings

      July 17, 2025

      Intel is laying off thousands of US workers in AI restructuring — CEO Lip-Bu Tan says it’s “too late” to catch up with the competition

      July 17, 2025

      Elon Musk says “We need more babies” — then creates digital girlfriends so you actually won’t go out and make any babies

      July 17, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-53621 – DSpace XXE Injection Vulnerability

    CVE-2025-53621 – DSpace XXE Injection Vulnerability

    July 15, 2025

    CVE ID : CVE-2025-53621

    Published : July 15, 2025, 3:15 p.m. | 1 hour, 19 minutes ago

    Description : DSpace open source software is a repository application which provides durable access to digital resources. Two related XML External Entity (XXE) injection possibilities impact all versions of DSpace prior to 7.6.4, 8.2, and 9.1. External entities are not disabled when parsing XML files during import of an archive (in Simple Archive Format), either from command-line (`./dspace import` command) or from the “Batch Import (Zip)” user interface feature. External entities are also not explicitly disabled when parsing XML responses from some upstream services (ArXiv, Crossref, OpenAIRE, Creative Commons) used in import from external sources via the user interface or REST API. An XXE injection in these files may result in a connection being made to an attacker’s site or a local path readable by the Tomcat user, with content potentially being injected into a metadata field. In the latter case, this may result in sensitive content disclosure, including retrieving arbitrary files or configurations from the server where DSpace is running. The Simple Archive Format (SAF) importer / Batch Import (Zip) is only usable by site administrators (from user interface / REST API) or system administrators (from command-line). Therefore, to exploit this vulnerability, the malicious payload would have to be provided by an attacker and trusted by an administrator, who would trigger the import. The fix is included in DSpace 7.6.4, 8.2, and 9.1. Please upgrade to one of these versions. For those who cannot upgrade immediately, it is possible to manually patch the DSpace backend. One may also apply some best practices, though the protection provided is not as complete as upgrading. Administrators must carefully inspect any SAF archives (they did not construct themselves) before importing. As necessary, affected external services can be disabled to mitigate the ability for payloads to be delivered via external service APIs.

    Severity: 6.9 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-53622 – DSpace Tomcat Path Traversal Vulnerability
    Next Article CVE-2025-52379 – Nexxt Solutions NCM-X1800 Mesh Router Remote Command Injection Vulnerability

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-3415 – Grafana Alerting DingDing Unauthenticated Viewer Escalation

    July 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-52933 – Apache Struts XML External Entity (XXE) Injection

    July 17, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Deno 2.4: deno bundle is back

    Development

    OptimusUI is a GUI for nVidia Optimus

    Linux

    CVE-2025-29686 – OA System Cross-Site Scripting (XSS)

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-7511 – Code-projects Chat System SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Windows 11’s Patch Tuesday update fixes annoying Firewall error log

    July 10, 2025

    This week’s Patch Tuesday update for Windows 11 does more than just tighten security. Microsoft…

    CVE-2025-4638 – PCL Zlib Inftrees Pointer Arithmetic Vulnerability

    May 14, 2025

    CVE-2025-32459 – Quantenna Wi-Fi Command Injection Vulnerability

    June 8, 2025

    Segway’s most powerful robot mower is ready for yards of all sizes

    April 2, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.