org.apache.poi:poi-ooxml@3.7 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.poi:poi-ooxml package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
XML External Entity (XXE) Injection

org.apache.poi:poi-ooxml is a Java API To Access Microsoft Format Files.

Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. When using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing.

How to fix XML External Entity (XXE) Injection?

Upgrade org.apache.poi:poi-ooxml to version 4.1.0 or higher.

[,4.1.0)
  • M
XML External Entity (XXE) Injection

org.apache.poi:poi-ooxml is a Java API To Access Microsoft Format Files.

Affected versions of this package are vulnerable to XML External Entity (XXE) Injection as it allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.

How to fix XML External Entity (XXE) Injection?

Upgrade org.apache.poi:poi-ooxml to version 3.15 or higher.

[,3.15)
  • M
XML External Entity (XXE) Injection

org.apache.poi:poi-ooxml is a Java API To Access Microsoft Format Files.

Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XXE) attack.

How to fix XML External Entity (XXE) Injection?

Upgrade org.apache.poi:poi-ooxml to version 3.11-beta2 or higher.

[,3.11-beta2)
  • M
XML External Entity (XXE) Injection

org.apache.poi:poi-ooxml is a Java API To Access Microsoft Format Files.

Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. The OPC SAX setup in Apache POI allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

How to fix XML External Entity (XXE) Injection?

Upgrade org.apache.poi:poi-ooxml to version 3.10.1, 3.11-beta2 or higher.

[,3.10.1) [3.11-beta1,3.11-beta2)