No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 13 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | XML Entity Expansion Vulnerability in Docling JATS Backend Causes Denial of Service |
Tue, 12 May 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | XML Entity Expansion in Docling JATS XML Backend Causes Denial of Service | |
| Weaknesses | CWE-606 CWE-749 |
Tue, 12 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-400 | |
| Metrics |
cvssV3_1
|
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Docling-project
Docling-project docling |
|
| Vendors & Products |
Docling-project
Docling-project docling |
Mon, 11 May 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | XML Entity Expansion in Docling JATS XML Backend Causes Denial of Service | |
| Weaknesses | CWE-606 CWE-749 |
Mon, 11 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Docling's JATS XML backend is vulnerable to XML Entity Expansion (XXE) attacks thru 2.61.0. The backend uses etree.parse() to parse XML files without disabling entity resolution. An attacker can craft a malicious XML file containing a nested entity expansion payload (XML Bomb). When processed by Docling, the exponential expansion of entities leads to excessive resource consumption, resulting in a denial of service (DoS) condition on the system running the Docling parser. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-12T18:42:55.864Z
Reserved: 2026-03-09T00:00:00.000Z
Link: CVE-2026-31247
Updated: 2026-05-12T18:42:50.900Z
Status : Deferred
Published: 2026-05-11T16:17:29.743
Modified: 2026-05-13T15:47:35.667
Link: CVE-2026-31247
No data.
OpenCVE Enrichment
Updated: 2026-05-13T00:00:17Z