GHSA-V7CP-2CX9-X793

Vulnerability from github – Published: 2026-05-04 20:56 – Updated: 2026-05-14 20:42
VLAI?
Summary
changedetection.io project has an XXE vulnerability
Details

changedetection.io_XXE_01 Vulnerability Report: We discovered a XXE vulnerability in the changedetection.io project

While analyzing the code logic, it was determined that an area may lead to unintended behavior under specific conditions. With the project's security in mind, see the analysis results to discern whether this may indicate a potential security risk.

Overview

  • SOURCE_VERSION: 0.54.9 (9f3a9fdc18bba404244801e5df8109e213ce9ff4)
  • Vulnerability type: XXE
  • Finding title: XML XPath helpers parse untrusted XML with entity resolution left to lxml defaults
  • Affected location: changedetectionio/html_tools.py:287

Root Cause

xpath_filter() switches to XML mode for XML/RSS content and creates etree.XMLParser(strip_cdata=False) without explicitly disabling external entity resolution, external DTD loading, or network-backed entity lookup. The helper then parses untrusted XML bytes directly with etree.fromstring(...).

Source-to-Sink Chain

  1. Untrusted XML/RSS response content is fetched from monitored URLs.
  2. Stream detection marks the content as XML/RSS and the include-filter path invokes xpath_filter(..., is_xml=True).
  3. xpath_filter() builds the default XML parser and calls etree.fromstring(...) at changedetectionio/html_tools.py:287.
  4. External entity declarations in attacker XML can be expanded by parser-default behavior in affected runtime combinations.

Exploitation Preconditions

  1. Attacker controls the watched XML/RSS response body.
  2. The watch uses an XPath include filter that triggers XML helper parsing.
  3. Runtime parser behavior allows external entity expansion (for example, vulnerable dependency/default combinations).
  4. The process can read the referenced local resource.

Risk

The XML helper path can turn watch processing into a local file disclosure primitive when entity expansion is enabled by parser defaults.

Impact

Sensitive local files can be exposed into extracted watch output, diff history, and downstream notification channels.

Remediation

  1. Harden XML parser construction with resolve_entities=False, load_dtd=False, and no_network=True.
  2. Reject DOCTYPE/entity declarations for untrusted XML if DTD features are unnecessary.
  3. Add regression tests that assert external entities are never expanded in XPath XML helper flows.
Show details on source website

{
  "affected": [
    {
      "package": {
        "ecosystem": "PyPI",
        "name": "changedetection.io"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "last_affected": "0.54.9"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2026-41895"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-611"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2026-05-04T20:56:36Z",
    "nvd_published_at": "2026-05-12T18:17:23Z",
    "severity": "HIGH"
  },
  "details": "# changedetection.io_XXE_01 Vulnerability Report: We discovered a XXE vulnerability in the changedetection.io project\n\nWhile analyzing the code logic, it was determined that an area may lead to unintended behavior under specific conditions. With the project\u0027s security in mind, see the analysis results to discern whether this may indicate a potential security risk.\n\n## Overview\n- SOURCE_VERSION: `0.54.9 (9f3a9fdc18bba404244801e5df8109e213ce9ff4)`\n- Vulnerability type: `XXE`\n- Finding title: `XML XPath helpers parse untrusted XML with entity resolution left to lxml defaults`\n- Affected location: `changedetectionio/html_tools.py:287`\n\n## Root Cause\n`xpath_filter()` switches to XML mode for XML/RSS content and creates `etree.XMLParser(strip_cdata=False)` without explicitly disabling external entity resolution, external DTD loading, or network-backed entity lookup. The helper then parses untrusted XML bytes directly with `etree.fromstring(...)`.\n\n## Source-to-Sink Chain\n1. Untrusted XML/RSS response content is fetched from monitored URLs.\n2. Stream detection marks the content as XML/RSS and the include-filter path invokes `xpath_filter(..., is_xml=True)`.\n3. `xpath_filter()` builds the default XML parser and calls `etree.fromstring(...)` at `changedetectionio/html_tools.py:287`.\n4. External entity declarations in attacker XML can be expanded by parser-default behavior in affected runtime combinations.\n\n## Exploitation Preconditions\n1. Attacker controls the watched XML/RSS response body.\n2. The watch uses an XPath include filter that triggers XML helper parsing.\n3. Runtime parser behavior allows external entity expansion (for example, vulnerable dependency/default combinations).\n4. The process can read the referenced local resource.\n\n## Risk\nThe XML helper path can turn watch processing into a local file disclosure primitive when entity expansion is enabled by parser defaults.\n\n## Impact\nSensitive local files can be exposed into extracted watch output, diff history, and downstream notification channels.\n\n## Remediation\n1. Harden XML parser construction with `resolve_entities=False`, `load_dtd=False`, and `no_network=True`.\n2. Reject `DOCTYPE`/entity declarations for untrusted XML if DTD features are unnecessary.\n3. Add regression tests that assert external entities are never expanded in XPath XML helper flows.",
  "id": "GHSA-v7cp-2cx9-x793",
  "modified": "2026-05-14T20:42:57Z",
  "published": "2026-05-04T20:56:36Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-v7cp-2cx9-x793"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41895"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/dgtlmoon/changedetection.io"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "type": "CVSS_V3"
    },
    {
      "score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
      "type": "CVSS_V4"
    }
  ],
  "summary": "changedetection.io project has an XXE vulnerability"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…