Pachno 1.0.6 contains an XML external entity injection vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting unsafe XML parsing in the TextParser helper. Attackers can inject malicious XML entities through wiki table syntax and inline tags in issue descriptions, comments, and wiki articles to trigger entity resolution via simplexml_load_string() without LIBXML_NONET restrictions.
Metrics
Affected Vendors & Products
References
History
Mon, 13 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Pachno 1.0.6 contains an XML external entity injection vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting unsafe XML parsing in the TextParser helper. Attackers can inject malicious XML entities through wiki table syntax and inline tags in issue descriptions, comments, and wiki articles to trigger entity resolution via simplexml_load_string() without LIBXML_NONET restrictions. | |
| Title | Pachno 1.0.6 Wiki TextParser XML External Entity Injection | |
| First Time appeared |
Pachno
Pachno pachno |
|
| Weaknesses | CWE-403 | |
| CPEs | cpe:2.3:a:pachno:pachno:1.0.6:*:*:*:*:*:*:* | |
| Vendors & Products |
Pachno
Pachno pachno |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-04-13T18:10:59.054Z
Updated: 2026-04-13T18:10:59.054Z
Reserved: 2026-04-08T13:39:22.100Z
Link: CVE-2026-40042
No data.
Status : Received
Published: 2026-04-13T19:16:51.960
Modified: 2026-04-13T19:16:51.960
Link: CVE-2026-40042
No data.