Docling's JATS XML backend is vulnerable to XML Entity Expansion (XXE) attacks thru 2.61.0. The backend uses etree.parse() to parse XML files without disabling entity resolution. An attacker can craft a malicious XML file containing a nested entity expansion payload (XML Bomb). When processed by Docling, the exponential expansion of entities leads to excessive resource consumption, resulting in a denial of service (DoS) condition on the system running the Docling parser.
Metrics
Affected Vendors & Products
References
History
Mon, 11 May 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | XML Entity Expansion in Docling JATS XML Backend Causes Denial of Service | |
| Weaknesses | CWE-606 CWE-749 |
Mon, 11 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Docling's JATS XML backend is vulnerable to XML Entity Expansion (XXE) attacks thru 2.61.0. The backend uses etree.parse() to parse XML files without disabling entity resolution. An attacker can craft a malicious XML file containing a nested entity expansion payload (XML Bomb). When processed by Docling, the exponential expansion of entities leads to excessive resource consumption, resulting in a denial of service (DoS) condition on the system running the Docling parser. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-11T15:26:07.806Z
Reserved: 2026-03-09T00:00:00.000Z
Link: CVE-2026-31247
No data.
Status : Received
Published: 2026-05-11T16:17:29.743
Modified: 2026-05-11T16:17:29.743
Link: CVE-2026-31247
No data.
OpenCVE Enrichment
Updated: 2026-05-11T16:45:15Z