Apache SIS: XML External Entity (XXE) vulnerability
Description
Improper Restriction of XML External Entity Reference vulnerability in Apache SIS.
It is possible to write XML files in such a way that, when parsed by Apache SIS, an XML file reveals to the attacker the content of a local file on the server running Apache SIS. This vulnerability impacts the following SIS services:
- Reading of GeoTIFF files having the GEO_METADATA tag defined by the Defense Geospatial Information Working Group (DGIWG).
- Parsing of ISO 19115 metadata in XML format.
- Parsing of Coordinate Reference Systems defined in the GML format.
- Parsing of files in GPS Exchange Format (GPX).
This issue affects Apache SIS from versions 0.4 through 1.5 inclusive. Users are recommended to upgrade to version 1.6, which will fix the issue. In the meantime, the security vulnerability can be avoided by launching Java with the javax.xml.accessExternalDTD system property sets to a comma-separated list of authorized protocols. For example:
java -Djavax.xml.accessExternalDTD="" ...
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache SIS before 1.6 has an XXE vulnerability that allows attackers to read local files through crafted XML or GeoTIFF files.
Vulnerability
Overview
CVE-2025-68280 is an XML External Entity (XXE) vulnerability in Apache SIS, a Java library for geospatial applications. The root cause is improper restriction of XML external entity references during XML parsing [1][3]. This affects versions 0.4 through 1.5 inclusive [1].
Attack
Surface
An attacker can exploit this by crafting XML files or GeoTIFF files with the DGIWG GEO_METADATA tag [1]. When Apache SIS parses these files—whether for ISO 19115 metadata, GML coordinate reference systems, or GPX files—the parser processes external entity references, allowing the attacker to query local files [1][3]. No authentication is mentioned as a prerequisite, suggesting the attack is file-based.
Impact
Successful exploitation reveals the content of arbitrary local files on the server to the attacker [1][3]. This can expose sensitive configuration files, credentials, or other data.
Mitigation
The vulnerability is fixed in Apache SIS version 1.6 [1][3]. Until upgrade, operators can mitigate by launching Java with the system property -Djavax.xml.accessExternalDTD="" to disable external DTDs [1][4]. A commit related to the fix is referenced [4].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.sis.core:sis-metadataMaven | >= 0.4, < 1.6 | 1.6 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-jqmr-2pg9-vfx7ghsaADVISORY
- lists.apache.org/thread/s4ggy3zbtrrn93glgo2vn52lgcxk4bp4ghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2025-68280ghsaADVISORY
- www.openwall.com/lists/oss-security/2026/01/05/11ghsaWEB
- www.openwall.com/lists/oss-security/2026/01/05/7ghsaWEB
News mentions
0No linked articles in our index yet.