OpenRemote is an open-source internet-of-things platform. Prior to version 1.22.0, the Velbus asset import path parses attacker-controlled XML without explicit XXE hardening. An authenticated user who can call the import endpoint may trigger XML external entity processing, which can lead to server-side file disclosure and SSRF. The target file must be less than 1023 characters. Version 1.22.0 fixes the issue.
Metrics
Affected Vendors & Products
References
History
Fri, 24 Apr 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openremote:openremote:*:*:*:*:*:*:*:* |
Thu, 23 Apr 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openremote
Openremote openremote |
|
| Vendors & Products |
Openremote
Openremote openremote |
Wed, 22 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenRemote is an open-source internet-of-things platform. Prior to version 1.22.0, the Velbus asset import path parses attacker-controlled XML without explicit XXE hardening. An authenticated user who can call the import endpoint may trigger XML external entity processing, which can lead to server-side file disclosure and SSRF. The target file must be less than 1023 characters. Version 1.22.0 fixes the issue. | |
| Title | OpenRemote has XXE in Velbus Asset Import | |
| Weaknesses | CWE-611 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-23T13:47:07.964Z
Reserved: 2026-04-15T15:57:41.719Z
Link: CVE-2026-40882
Updated: 2026-04-23T13:47:04.000Z
Status : Analyzed
Published: 2026-04-22T21:17:08.733
Modified: 2026-04-24T13:24:32.900
Link: CVE-2026-40882
No data.
OpenCVE Enrichment
Updated: 2026-04-22T21:30:27Z