Geonetwork 3.10 through 4.2.0 contains an XML external entity vulnerability in PDF rendering that allows attackers to retrieve arbitrary files from the server. Attackers can exploit the insecure XML parser by crafting a malicious XML document with external entity references to read system files through the baseURL parameter in PDF creation requests.
History

Tue, 13 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Geonetwork 3.10 through 4.2.0 contains an XML external entity vulnerability in PDF rendering that allows attackers to retrieve arbitrary files from the server. Attackers can exploit the insecure XML parser by crafting a malicious XML document with external entity references to read system files through the baseURL parameter in PDF creation requests.
Title Geonetwork 4.2.0 - XML External Entity (XXE)
Weaknesses CWE-611
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-13T22:51:45.416Z

Reserved: 2026-01-10T15:05:18.988Z

Link: CVE-2022-50899

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-13T23:15:52.007

Modified: 2026-01-13T23:15:52.007

Link: CVE-2022-50899

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.