Skip to main content

Improper Restriction of XML External Entity Reference in org.eclipse.jgit:org.eclipse.jgit

CVE-2025-4949

  • org.eclipse.jgit:org.eclipse.jgit
Severity Medium
Score 6.8/10

Summary

In Eclipse JGit versions through 6.10.0.202406032230-r, 7.0.0.202407101547-m1 through 7.0.0.202409031743-r, 7.1.0.202410012040-m1 through 7.1.0.202411261347-r, 7.2.0.202501291320-m2 through 7.2.0.202503040940-r and versions 7.3.0.202504081226-m1 through 7.3.0.202505070700-m2, the "ManifestParser" class used by the repo command and the "AmazonS3" class used to implement the experimental amazons3 git transport protocol allowing to store "git pack" files in an Amazon S3 bucket, are vulnerable to XML External Entity (XXE) attacks when parsing "XML" files. This vulnerability can lead to Information Disclosure, Denial of Service (DOS), and other security issues.

  • HIGH
  • NETWORK
  • NONE
  • UNCHANGED
  • REQUIRED
  • NONE
  • NONE
  • HIGH

CWE-611 - Improper Restriction of XML External Entity Reference

Listed 4th in the 'OWASP Top Ten', XML External Entities (XXE) vulnerability allows attackers to provide an XML input that contains an external entity. When the XML is parsed, it can cause data extraction and manipulation, execution of commands, denial-of-service attacks, and server-side request forgery.

Advisory Timeline

  • Published