CVE-2025-47293

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-47293
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-47293.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-47293
Aliases
Published
2025-06-19T22:15:19Z
Modified
2025-07-01T16:32:46.420120Z
Summary
[none]
Details

PowSyBl (Power System Blocks) is a framework to build power system oriented software. Prior to version 6.7.2, in certain places, powsybl-core XML parsing is vulnerable to an XML external entity (XXE) attack and to a server-side request forgery (SSRF) attack. This allows an attacker to elevate their privileges to read files that they do not have permissions to, including sensitive files on the system. The vulnerable class is com.powsybl.commons.xml.XmlReader which is considered to be untrusted in use cases where untrusted users can submit their XML to the vulnerable methods. This can be a multi-tenant application that hosts many different users perhaps with different privilege levels. This issue has been patched in com.powsybl:powsybl-commons: 6.7.2.

References

Affected packages

Git / github.com/powsybl/powsybl-core

Affected ranges

Type
GIT
Repo
https://github.com/powsybl/powsybl-core
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v1.*

v1.1.0

v2.*

v2.0.0
v2.1.0
v2.2.0
v2.3.0
v2.4.0
v2.5.0
v2.6.0

v3.*

v3.0.0
v3.3.0-RC1
v3.5.0-RC1
v3.7.0-RC1
v3.8.0-RC1

v4.*

v4.0.0-RC1
v4.1.0-RC1
v4.10.0-RC1
v4.2.0-RC1
v4.4.0-RC1
v4.5.0-RC1
v4.6.0-RC1
v4.7.0-RC1
v4.8.0-RC1
v4.9.0-RC1

v5.*

v5.0.0-RC1
v5.1.0-RC1
v5.2.0-RC1
v5.3.0

v6.*

v6.0.0-RC1
v6.1.0
v6.2.0-RC1
v6.3.0
v6.4.0-RC1
v6.5.0-RC1
v6.6.0-RC1
v6.7.0
v6.7.0-RC1
v6.7.1