VYPR
High severityNVD Advisory· Published Oct 9, 2018· Updated Sep 16, 2024

CVE-2018-11796

CVE-2018-11796

Description

In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Tika fails to retain SAXParser security limits after the first parse, enabling XXE-based denial of service via entity expansion across versions 0.1 to 1.19.

Vulnerability

In Apache Tika versions 0.1 through 1.19- (CVE-2018-11761 introduced a fix that was incomplete), the SAXParser used for XML parsing is reused across multiple parse operations. After each parse, a call to reset() is made on the parser, which for Xerces2 implementations removes the user-specified SecurityManager that enforces entity expansion limits [1][2][4]. This means the expansion limit is only active for the first XML document parsed; subsequent parses revert to default, unlimited behavior, leaving the application vulnerable to denial of service via XML entity expansion attacks.

Exploitation

An attacker can send a crafted XML document to an Apache Tika instance (e.g., via file upload or API endpoint). After the first parse resets the security configuration, the attacker sends a second (or later) XML document containing nested entity expansions that exhaust system memory or CPU time. No special authentication or network position is required if the Tika endpoint is publicly accessible; the attack only requires the ability to submit XML content that Tika will parse [2][4].

Impact

Successful exploitation results in a denial of service (DoS) condition—the Tika process may consume excessive memory or CPU, causing slowdowns or crashes. The vulnerability does not lead to information disclosure, file write, or remote code execution; it is purely a resource exhaustion attack targeting availability. The scope of compromise is limited to the Tika service itself, but it can affect dependent systems consuming Tika output [2][4].

Mitigation

Users should upgrade to Apache Tika 1.19.1 or later, which correctly retains entity expansion limits across SAXParser resets [1][2][4]. Red Hat issued a related advisory (RHSA-2019:3892) for Red Hat Enterprise Linux distributions [1]. No workaround is available for previous versions; the fix is the only complete mitigation. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.tika:tika-coreMaven
>= 0.1, < 1.19.11.19.1

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.