CVE-2025-15251
MEDIUMbeecue FastBee <2.1 - XML External Entity Reference
Title source: llmDescription
A vulnerability was detected in beecue FastBee up to 2.1. Impacted is the function getRootElement of the file springboot/fastbee-server/sip-server/src/main/java/com/fastbee/sip/handler/req/ReqAbstractHandler.java of the component SIP Message Handler. The manipulation results in xml external entity reference. It is possible to launch the attack remotely. A high complexity level is associated with this attack. The exploitability is considered difficult. The project owner replied to the issue report: "Okay, we'll handle it as soon as possible."
Exploits (2)
gitee
7,650 stars
by kerwincui · javawriteup
https://gitee.com/beecue/fastbee/issues/ID7HNZ#note_47777408_link
Scores
CVSS v3
5.6
EPSS
0.0007
EPSS Percentile
20.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Details
CWE
CWE-610
CWE-611
Status
published
Published
Dec 30, 2025
Tracked Since
Feb 18, 2026