VYPR
High severityNVD Advisory· Published Sep 19, 2018· Updated Sep 16, 2024

CVE-2018-11761

CVE-2018-11761

Description

In Apache Tika 0.1 to 1.18, the XML parsers were not configured to limit entity expansion. They were therefore vulnerable to an entity expansion vulnerability which can lead to a denial of service attack.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Tika 0.1 to 1.18 XML parsers are vulnerable to entity expansion, leading to denial of service via crafted XML.

Vulnerability

In Apache Tika versions 0.1 through 1.18, the XML parsers were not configured to limit entity expansion, making them susceptible to an XML entity expansion (billion laughs) attack. This affects all components using XML parsing. [1][2]

Exploitation

An attacker can exploit this vulnerability by providing a specially crafted XML file to an affected Tika instance (e.g., via uploaded documents). No authentication is required. The attack involves sending a small XML payload that expands exponentially, consuming server memory and CPU. [1][2]

Impact

Successful exploitation leads to a denial of service (DoS) condition, as the server becomes unresponsive due to resource exhaustion. The vulnerability does not lead to code execution or data disclosure. [1][2]

Mitigation

The vulnerability is fixed in Apache Tika version 1.19.1. Users should upgrade to 1.19.1 or later. No workarounds are documented for earlier versions. [2]

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.tika:tika-coreMaven
>= 0.1, < 1.19.11.19.1

Affected products

29

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.