CVE-2025-15251

MEDIUM

beecue FastBee <2.1 - XML External Entity Reference

Title source: llm

Description

A vulnerability was detected in beecue FastBee up to 2.1. Impacted is the function getRootElement of the file springboot/fastbee-server/sip-server/src/main/java/com/fastbee/sip/handler/req/ReqAbstractHandler.java of the component SIP Message Handler. The manipulation results in xml external entity reference. It is possible to launch the attack remotely. A high complexity level is associated with this attack. The exploitability is considered difficult. The project owner replied to the issue report: "Okay, we'll handle it as soon as possible."

Exploits (2)

gitee 7,650 stars
by kerwincui · javawriteup
https://gitee.com/beecue/fastbee/issues/ID7HNZ

Scores

CVSS v3 5.6
EPSS 0.0007
EPSS Percentile 20.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Details

CWE
CWE-610 CWE-611
Status published
Published Dec 30, 2025
Tracked Since Feb 18, 2026