<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Xml — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/xml/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 13 Apr 2026 22:18:02 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/xml/feed.xml" rel="self" type="application/rss+xml"/><item><title>ImageMagick XML Bomb Denial-of-Service Vulnerability (CVE-2026-33908)</title><link>https://feed.craftedsignal.io/briefs/2026-04-imagemagick-dos/</link><pubDate>Mon, 13 Apr 2026 22:18:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-imagemagick-dos/</guid><description>ImageMagick versions prior to 7.1.2-19 and 6.9.13-44 are susceptible to a denial-of-service (DoS) attack due to unbounded recursion during XML parsing, potentially leading to stack exhaustion.</description><content:encoded><![CDATA[<p>ImageMagick is a widely used open-source software suite for displaying, converting, and editing raster image and vector image files. A critical vulnerability, identified as CVE-2026-33908, affects versions before 7.1.2-19 and 6.9.13-44. This vulnerability stems from the lack of depth limit during recursive processing of XML files via the <code>DestroyXMLTree()</code> function. An attacker can exploit this by crafting a malicious XML file with deeply nested structures. When ImageMagick parses this file, the recursive function exhausts stack memory, leading to a denial-of-service condition. Successful exploitation can disrupt services relying on ImageMagick, impacting image processing workflows. The vulnerability was addressed in versions 6.9.13-44 and 7.1.2-19.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious XML file with deeply nested elements.</li>
<li>The attacker delivers the crafted XML file to a system running a vulnerable version of ImageMagick (e.g., via upload, network share, or email attachment).</li>
<li>A user or automated process triggers ImageMagick to process the malicious XML file using command-line tools such as <code>convert</code> or through a web application using an ImageMagick library.</li>
<li>ImageMagick begins parsing the XML file and calls the <code>DestroyXMLTree()</code> function to free memory.</li>
<li>The <code>DestroyXMLTree()</code> function recursively traverses the XML tree without a depth limit.</li>
<li>Due to the deeply nested structure, the recursive calls consume excessive stack memory.</li>
<li>Stack memory is exhausted, leading to a stack overflow.</li>
<li>The ImageMagick process crashes, resulting in a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33908 leads to a denial-of-service condition on the affected system. Services relying on ImageMagick for image processing become unavailable, potentially disrupting critical workflows. The CVSS v3.1 base score for this vulnerability is 7.5, indicating a high potential impact on system availability. The number of affected systems depends on the prevalence of vulnerable ImageMagick versions within an organization&rsquo;s infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ImageMagick to version 7.1.2-19 or 6.9.13-44 or later to remediate CVE-2026-33908.</li>
<li>Implement file size limits and input validation for XML files processed by ImageMagick to mitigate the risk of malicious file uploads.</li>
<li>Deploy the Sigma rule <code>ImageMagick_XML_Crash</code> to detect potential exploitation attempts by monitoring for ImageMagick process crashes.</li>
<li>Monitor web server logs for unusual patterns of requests with large XML file uploads to identify potential attackers.</li>
<li>Enable process crash reporting on systems running ImageMagick to facilitate incident response and investigation.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>dos</category><category>imagemagick</category><category>xml</category><category>cve-2026-33908</category></item><item><title>CPCI85 and SICORE Base System XML Out-of-Bounds Write Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-cpc85-xml-dos/</link><pubDate>Thu, 26 Mar 2026 15:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-cpc85-xml-dos/</guid><description>An unauthenticated attacker can exploit an out-of-bounds write vulnerability in CPCI85 Central Processing/Communication and SICORE Base System by sending a malicious XML request, potentially causing a service crash leading to a denial-of-service condition.</description><content:encoded><![CDATA[<p>A vulnerability, tracked as CVE-2026-27664, exists within CPCI85 Central Processing/Communication (all versions prior to V26.10) and SICORE Base system (all versions prior to V26.10.0). This flaw stems from an out-of-bounds write during the parsing of maliciously crafted XML inputs. An unauthenticated attacker could exploit this vulnerability by sending a specifically designed XML request to the targeted system. Successful exploitation results in a service crash, effectively creating a denial-of-service (DoS) condition. This vulnerability poses a significant risk to the availability of systems relying on the affected CPCI85 and SICORE Base system components. Defenders should prioritize patching and implement mitigations to prevent potential disruptions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable CPCI85 or SICORE Base system instance exposed to network traffic.</li>
<li>The attacker crafts a malicious XML payload designed to trigger the out-of-bounds write vulnerability.</li>
<li>The attacker sends the malicious XML payload to the targeted system via a network request.</li>
<li>The CPCI85 or SICORE Base system receives the XML payload and attempts to parse it.</li>
<li>During XML parsing, the vulnerability is triggered due to the specially crafted XML structure, leading to an out-of-bounds write operation.</li>
<li>The out-of-bounds write corrupts memory within the application process.</li>
<li>The memory corruption causes the service to crash.</li>
<li>The crash results in a denial-of-service condition, rendering the affected system unavailable.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-27664 leads to a denial-of-service condition on the affected CPCI85 Central Processing/Communication and SICORE Base systems. The number of potential victims depends on the deployment scope of these systems; however, any system using versions prior to V26.10 and V26.10.0, respectively, is vulnerable. This DoS can disrupt critical operations relying on these systems, potentially impacting industrial control processes or other essential services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch provided by Siemens to update CPCI85 Central Processing/Communication to version V26.10 or later, and SICORE Base system to version V26.10.0 or later to remediate CVE-2026-27664 (<a href="https://cert-portal.siemens.com/productcert/html/ssa-246443.html)">https://cert-portal.siemens.com/productcert/html/ssa-246443.html)</a>.</li>
<li>Implement network segmentation and access control policies to limit exposure of CPCI85 and SICORE Base systems to untrusted networks.</li>
<li>Monitor web server logs for abnormal XML request patterns targeting the affected systems using a custom rule inspecting <code>cs-uri-query</code> for anomalous XML structures.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-27664</category><category>denial-of-service</category><category>xml</category></item><item><title>xmldom XML Node Injection via Comment Serialization</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-xmldom-injection/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-xmldom-injection/</guid><description>The xmldom library is vulnerable to XML node injection, allowing attackers to inject arbitrary XML nodes into serialized output by manipulating comment content; this is mitigated by using the `requireWellFormed` option in `serializeToString` after upgrading to version 0.8.13 or 0.9.10.</description><content:encoded><![CDATA[<p>The xmldom library is susceptible to XML node injection due to a lack of validation when serializing comment nodes. Versions prior to 0.8.13 and versions between 0.9.0 and 0.9.10 are vulnerable. An attacker can inject arbitrary XML nodes into the serialized output by including comment-breaking sequences (e.g., <code>--&gt;</code>) in the comment data. This allows them to alter the structure of the XML document. Exploitation involves crafting malicious input that leverages the library&rsquo;s DOM construction and serialization flow. It matters because applications using xmldom to process potentially untrusted XML data could be coerced into generating malicious XML structures. The fix requires an opt-in <code>requireWellFormed</code> flag to be enabled when calling <code>serializeToString()</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An application receives untrusted data intended for use in XML comment content.</li>
<li>The application calls <code>createComment(data)</code> in xmldom, passing the untrusted data. The library stores the data without proper validation.</li>
<li>The application constructs an XML document, including the comment node created in the previous step.</li>
<li>The application calls <code>serializeToString()</code> on the XML document to serialize it.</li>
<li>If the untrusted data contains comment-breaking sequences, such as <code>--&gt;</code>, the serializer prematurely terminates the comment.</li>
<li>The serializer injects any subsequent content in the untrusted data as live XML markup.</li>
<li>The application stores, forwards, signs, or hands the serialized XML to another parser.</li>
<li>The downstream consumer trusts the altered XML structure, leading to unintended consequences, such as misconfiguration or security bypass.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to inject arbitrary XML nodes, potentially altering the structure and meaning of generated XML documents. This could lead to misconfiguration, policy bypass, or other security vulnerabilities in applications that rely on the integrity of the XML structure. The vulnerability affects applications that use xmldom to build XML from untrusted input. The number of victims depends on the usage of the vulnerable library and the exposure of applications to untrusted XML data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>@xmldom/xmldom</code> version 0.8.13 or 0.9.10 or later to gain access to the fix.</li>
<li>Audit all calls to <code>serializeToString()</code> and add the <code>{ requireWellFormed: true }</code> option when serializing comments containing potentially untrusted data.</li>
<li>Implement server-side input validation to sanitize comment data by removing comment-breaking sequences like <code>--&gt;</code> before passing it to <code>createComment()</code>.</li>
<li>Deploy the Sigma rule to detect comment injections.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xml</category><category>injection</category><category>deserialization</category><category>vulnerability</category></item><item><title>PhpSpreadsheet XML Reader Denial of Service via Unbounded Row Index</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-phpspreadsheet-dos/</link><pubDate>Tue, 09 Jan 2024 18:45:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-phpspreadsheet-dos/</guid><description>PhpSpreadsheet is vulnerable to a denial-of-service attack by crafting a SpreadsheetML XML file with an excessively large row index, which exhausts server CPU resources due to unbounded iteration.</description><content:encoded><![CDATA[<p>The PhpSpreadsheet library is susceptible to a denial-of-service (DoS) vulnerability within its SpreadsheetML XML reader (<code>Reader\Xml</code>). This flaw arises because the reader fails to validate the <code>ss:Index</code> row attribute against the maximum allowed row count (<code>AddressRange::MAX_ROW = 1,048,576</code>). By crafting a malicious SpreadsheetML XML file containing an extremely large <code>ss:Index</code> value (e.g., &ldquo;999999999&rdquo;) on a <code>&lt;Row&gt;</code> element, an attacker can inflate the internal <code>cachedHighestRow</code> property to approximately 1 billion. Subsequently, any call to <code>getRowIterator()</code> without a specified end row will attempt to iterate over this inflated range, leading to CPU exhaustion and ultimately a DoS condition. This issue affects versions of PhpSpreadsheet from 2.0.0 to 5.6.0 and poses a risk to PHP applications that process user-uploaded SpreadsheetML XML files.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious SpreadsheetML XML file (e.g., <code>poc.xml</code>).</li>
<li>The crafted XML file contains a <code>&lt;Row&gt;</code> element with an <code>ss:Index</code> attribute set to a very large integer (e.g., <code>ss:Index=&quot;999999999&quot;</code>).</li>
<li>A PHP application using PhpSpreadsheet loads the malicious XML file using <code>IOFactory::createReader('Xml')-&gt;load('poc.xml')</code>.</li>
<li>The <code>loadSpreadsheetFromFile</code> method in <code>src/PhpSpreadsheet/Reader/Xml.php</code> processes the <code>&lt;Row&gt;</code> element, reads the <code>ss:Index</code> value, and casts it to an integer without validation.</li>
<li>The <code>getRowDimension()</code> method in <code>src/PhpSpreadsheet/Worksheet.php</code> is called with the attacker-controlled <code>$rowID</code>, inflating the <code>cachedHighestRow</code> property.</li>
<li>A subsequent call to <code>$sheet-&gt;getRowIterator()</code> attempts to iterate from the beginning to the inflated <code>cachedHighestRow</code>, triggering excessive CPU consumption.</li>
<li>The server&rsquo;s CPU resources are exhausted, leading to a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability allows attackers to cause a denial-of-service condition on servers running PHP applications that utilize PhpSpreadsheet to process SpreadsheetML XML files. The impact includes:</p>
<ul>
<li>CPU exhaustion with a small malicious file (~300 bytes).</li>
<li>Blocking PHP worker processes, affecting concurrent users.</li>
<li>Triggering PHP <code>max_execution_time</code> limits while still consuming resources.</li>
<li>Applications are vulnerable without authentication if they allow the processing of uploaded SpreadsheetML files.</li>
</ul>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement validation for the <code>ss:Index</code> attribute in <code>src/PhpSpreadsheet/Reader/Xml.php</code> to ensure it does not exceed <code>AddressRange::MAX_ROW</code>. Apply this validation to both <code>&lt;Row&gt;</code> and <code>&lt;Cell&gt;</code> elements. Use the fix from the advisory (<a href="https://github.com/advisories/GHSA-84wq-86v6-x5j6">https://github.com/advisories/GHSA-84wq-86v6-x5j6</a>) as a reference.</li>
<li>Deploy the Sigma rule <code>DetectSuspiciousPhpSpreadsheetXML</code> to detect the use of extremely large row indexes in SpreadsheetML files.</li>
<li>Monitor web server logs for requests uploading XML files and triggering high CPU usage, correlating with the execution of PhpSpreadsheet.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>xml</category><category>phpspreadsheet</category></item></channel></rss>