CVE-2018-11796
Description
In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Tika fails to retain SAXParser security limits after the first parse, enabling XXE-based denial of service via entity expansion across versions 0.1 to 1.19.
Vulnerability
In Apache Tika versions 0.1 through 1.19- (CVE-2018-11761 introduced a fix that was incomplete), the SAXParser used for XML parsing is reused across multiple parse operations. After each parse, a call to reset() is made on the parser, which for Xerces2 implementations removes the user-specified SecurityManager that enforces entity expansion limits [1][2][4]. This means the expansion limit is only active for the first XML document parsed; subsequent parses revert to default, unlimited behavior, leaving the application vulnerable to denial of service via XML entity expansion attacks.
Exploitation
An attacker can send a crafted XML document to an Apache Tika instance (e.g., via file upload or API endpoint). After the first parse resets the security configuration, the attacker sends a second (or later) XML document containing nested entity expansions that exhaust system memory or CPU time. No special authentication or network position is required if the Tika endpoint is publicly accessible; the attack only requires the ability to submit XML content that Tika will parse [2][4].
Impact
Successful exploitation results in a denial of service (DoS) condition—the Tika process may consume excessive memory or CPU, causing slowdowns or crashes. The vulnerability does not lead to information disclosure, file write, or remote code execution; it is purely a resource exhaustion attack targeting availability. The scope of compromise is limited to the Tika service itself, but it can affect dependent systems consuming Tika output [2][4].
Mitigation
Users should upgrade to Apache Tika 1.19.1 or later, which correctly retains entity expansion limits across SAXParser resets [1][2][4]. Red Hat issued a related advisory (RHSA-2019:3892) for Red Hat Enterprise Linux distributions [1]. No workaround is available for previous versions; the fix is the only complete mitigation. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.tika:tika-coreMaven | >= 0.1, < 1.19.1 | 1.19.1 |
Affected products
2- Apache Software Foundation/Apache Tikav5Range: Apache Tomcat 0.1 to 1.19
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- access.redhat.com/errata/RHSA-2019:3892ghsavendor-advisoryx_refsource_REDHATWEB
- github.com/advisories/GHSA-h8q5-g2cj-qr5hghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2018-11796ghsaADVISORY
- www.securityfocus.com/bid/105585ghsavdb-entryx_refsource_BIDWEB
- lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05%40%3Cdev.tika.apache.org%3Emitrex_refsource_CONFIRM
- lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3EghsaWEB
- security.netapp.com/advisory/ntap-20190903-0002ghsaWEB
- security.netapp.com/advisory/ntap-20190903-0002/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.