CVE-2022-34169

HIGH

Apache Xalan <2.7.3 - Code Injection

Title source: llm

Description

The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.

Exploits (3)

nomisec WORKING POC 93 stars
by flowerwind · poc
https://github.com/flowerwind/AutoGenerateXalanPayload
nomisec WORKING POC 2 stars
by Disnaming · poc
https://github.com/Disnaming/CVE-2022-34169
nomisec SCANNER
by bor8 · poc
https://github.com/bor8/CVE-2022-34169

References (24)

... and 4 more

Scores

CVSS v3 7.5
EPSS 0.0666
EPSS Percentile 91.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Details

CWE
CWE-681
Status published
Products (35)
apache/xalan-java < 2.7.2
azul/zulu 6.47
azul/zulu 7.54
azul/zulu 8.62
azul/zulu 11.56
azul/zulu 13.48
azul/zulu 15.40
azul/zulu 17.34
azul/zulu 18.30
debian/debian_linux 10.0
... and 25 more
Published Jul 19, 2022
Tracked Since Feb 18, 2026