XML Injection RCE by parse http sitemap xml response vulnerability in Apache HertzBeat. The attacker needs to have an authenticated account with access, and add monitor parsed by xml, returned special content can trigger the XML parsing vulnerability. This issue affects Apache HertzBeat (incubating): before 1.7.0. Users are recommended to upgrade to version 1.7.0, which fixes the issue.
History

Wed, 10 Sep 2025 16:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:*

Wed, 10 Sep 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 09 Sep 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache hertzbeat
Vendors & Products Apache
Apache hertzbeat

Tue, 09 Sep 2025 09:45:00 +0000

Type Values Removed Values Added
Description XML Injection RCE by parse http sitemap xml response vulnerability in Apache HertzBeat. The attacker needs to have an authenticated account with access, and add monitor parsed by xml, returned special content can trigger the XML parsing vulnerability. This issue affects Apache HertzBeat (incubating): before 1.7.0. Users are recommended to upgrade to version 1.7.0, which fixes the issue.
Title Apache HertzBeat (incubating): RCE by parse http sitemap xml response
Weaknesses CWE-91
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2025-09-09T09:30:59.424Z

Updated: 2025-09-10T14:22:22.014Z

Reserved: 2025-01-21T14:41:26.279Z

Link: CVE-2025-24404

cve-icon Vulnrichment

Updated: 2025-09-10T14:22:18.092Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-09T10:15:33.087

Modified: 2025-09-10T15:53:00.190

Link: CVE-2025-24404

cve-icon Redhat

No data.