VYPR
Moderate severityNVD Advisory· Published Aug 23, 2019· Updated Aug 4, 2024

CVE-2019-12400

CVE-2019-12400

Description

In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Santuario XML Security for Java 2.0.3+ and 2.1.x before 2.1.4 improperly caches DocumentBuilders, allowing untrusted code to inject a malicious implementation via the context class loader.

Vulnerability

Analysis

CVE-2019-12400 is a security flaw in Apache Santuario XML Security for Java versions 2.0.3 through 2.0.x and all 2.1.x releases prior to 2.1.4. The vulnerability arises from a caching mechanism introduced to improve performance; the library uses a static pool of DocumentBuilders to speed up XML document creation. However, an attacker who can register a malicious DocumentBuilder implementation with the thread context class loader before Santuario initializes its cache may cause the library to cache and reuse that rogue implementation [4].

Exploitation

Exploitation requires that untrusted code can execute prior to Santuario's first use of the DocumentBuilder pool, typically in environments like application servers where multiple components share a JVM. If the attacker can load a malicious class via the context class loader, the cached builder will be used for subsequent XML signature verification or document processing, potentially bypassing security checks [1][2][3].

Impact

Successful exploitation could allow an attacker to subvert XML Signature validation, leading to forged or altered signed documents being accepted as authentic. The impact is primarily on the integrity and trustworthiness of XML-based signatures within affected applications [4].

Mitigation

Apache Santuario has fixed this issue in version 2.1.4. Users of affected releases should upgrade to 2.1.4 or a later version. Red Hat has also released patched packages in RHSA-2020:0804, RHSA-2020:0805, RHSA-2020:0806 for Red Hat JBoss Enterprise Application Platform [1][2][3].

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.santuario:xmlsecMaven
>= 2.0.3, < 2.1.42.1.4

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

24

News mentions

0

No linked articles in our index yet.