XML Injection RCE by parse http sitemap xml response vulnerability in Apache HertzBeat.
The attacker needs to have an authenticated account with access, and add monitor parsed by xml, returned special content can trigger the XML parsing vulnerability.
This issue affects Apache HertzBeat (incubating): before 1.7.0.
Users are recommended to upgrade to version 1.7.0, which fixes the issue.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/4ydy3tqbpwmhl79mcj3pxwqz62nggrfd | Mailing List Vendor Advisory |
Configurations
History
10 Sep 2025, 15:53
Type | Values Removed | Values Added |
---|---|---|
First Time |
Apache hertzbeat
Apache |
|
References | () https://lists.apache.org/thread/4ydy3tqbpwmhl79mcj3pxwqz62nggrfd - Mailing List, Vendor Advisory | |
CPE | cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:* |
10 Sep 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
09 Sep 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-09 10:15
Updated : 2025-09-10 15:53
NVD link : CVE-2025-24404
Mitre link : CVE-2025-24404
CVE.ORG link : CVE-2025-24404
JSON object : View
Products Affected
apache
- hertzbeat
CWE
CWE-91
XML Injection (aka Blind XPath Injection)