Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

@reyhkm
Copy link

@reyhkm reyhkm commented Oct 10, 2025

The XSLT filter module was vulnerable to XML External Entity (XXE) injection due to the use of the XML_PARSE_NOENT flag. This patch mitigates the vulnerability by removing the flag and explicitly disabling external entity loading, which is the recommended best practice for parsing untrusted XML.

The XSLT filter module was vulnerable to XML External Entity (XXE)
injection due to the use of the XML_PARSE_NOENT flag. This patch
mitigates the vulnerability by removing the flag and explicitly
disabling external entity loading, which is the recommended best
practice for parsing untrusted XML.
@github-actions
Copy link

github-actions bot commented Oct 10, 2025

✅ All required contributors have signed the F5 CLA for this PR. Thank you!
Posted by the CLA Assistant Lite bot.

@reyhkm
Copy link
Author

reyhkm commented Oct 10, 2025

I have hereby read the F5 CLA and agree to its terms

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant