Description
corenlp is vulnerable to Improper Restriction of XML External Entity Reference
References (2)
Core 2
Core References
Exploit, Third Party Advisory x_refsource_confirm
https://huntr.dev/bounties/a717aec2-5646-4a5f-ade0-dadc25736ae3
Patch, Third Party Advisory x_refsource_misc
https://github.com/stanfordnlp/corenlp/commit/1940ffb938dc4f3f5bc5f2a2fd8b35aabbbae3dd
Scores
CVSS v3
9.8
EPSS
0.0004
EPSS Percentile
12.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-611
Status
published
Products (2)
edu.stanford.nlp/stanford-corenlp
0Maven
stanford/corenlp
< 4.3.2
Published
Jan 17, 2022
Tracked Since
Feb 18, 2026