VYPR
Moderate severityOSV Advisory· Published Jan 5, 2026· Updated Jan 5, 2026

Apache SIS: XML External Entity (XXE) vulnerability

CVE-2025-68280

Description

Improper Restriction of XML External Entity Reference vulnerability in Apache SIS.

It is possible to write XML files in such a way that, when parsed by Apache SIS, an XML file reveals to the attacker the content of a local file on the server running Apache SIS. This vulnerability impacts the following SIS services:

  • Reading of GeoTIFF files having the GEO_METADATA tag defined by the Defense Geospatial Information Working Group (DGIWG).
  • Parsing of ISO 19115 metadata in XML format.
  • Parsing of Coordinate Reference Systems defined in the GML format.
  • Parsing of files in GPS Exchange Format (GPX).

This issue affects Apache SIS from versions 0.4 through 1.5 inclusive. Users are recommended to upgrade to version 1.6, which will fix the issue. In the meantime, the security vulnerability can be avoided by launching Java with the javax.xml.accessExternalDTD system property sets to a comma-separated list of authorized protocols. For example:

java -Djavax.xml.accessExternalDTD="" ...

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache SIS before 1.6 has an XXE vulnerability that allows attackers to read local files through crafted XML or GeoTIFF files.

Vulnerability

Overview

CVE-2025-68280 is an XML External Entity (XXE) vulnerability in Apache SIS, a Java library for geospatial applications. The root cause is improper restriction of XML external entity references during XML parsing [1][3]. This affects versions 0.4 through 1.5 inclusive [1].

Attack

Surface

An attacker can exploit this by crafting XML files or GeoTIFF files with the DGIWG GEO_METADATA tag [1]. When Apache SIS parses these files—whether for ISO 19115 metadata, GML coordinate reference systems, or GPX files—the parser processes external entity references, allowing the attacker to query local files [1][3]. No authentication is mentioned as a prerequisite, suggesting the attack is file-based.

Impact

Successful exploitation reveals the content of arbitrary local files on the server to the attacker [1][3]. This can expose sensitive configuration files, credentials, or other data.

Mitigation

The vulnerability is fixed in Apache SIS version 1.6 [1][3]. Until upgrade, operators can mitigate by launching Java with the system property -Djavax.xml.accessExternalDTD="" to disable external DTDs [1][4]. A commit related to the fix is referenced [4].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.sis.core:sis-metadataMaven
>= 0.4, < 1.61.6

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.