Pachno 1.0.6 contains an XML external entity injection vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting unsafe XML parsing in the TextParser helper. Attackers can inject malicious XML entities through wiki table syntax and inline tags in issue descriptions, comments, and wiki articles to trigger entity resolution via simplexml_load_string() without LIBXML_NONET restrictions.
Metrics
Affected Vendors & Products
References
History
Tue, 14 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Pachno 1.0.6 contains an XML external entity injection vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting unsafe XML parsing in the TextParser helper. Attackers can inject malicious XML entities through wiki table syntax and inline tags in issue descriptions, comments, and wiki articles to trigger entity resolution via simplexml_load_string() without LIBXML_NONET restrictions. | |
| Title | Pachno 1.0.6 Wiki TextParser XML External Entity Injection | |
| First Time appeared |
Pachno
Pachno pachno |
|
| Weaknesses | CWE-403 | |
| CPEs | cpe:2.3:a:pachno:pachno:1.0.6:*:*:*:*:*:*:* | |
| Vendors & Products |
Pachno
Pachno pachno |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-14T16:29:11.810Z
Reserved: 2026-04-08T13:39:22.100Z
Link: CVE-2026-40042
Updated: 2026-04-14T15:27:04.843Z
Status : Received
Published: 2026-04-13T19:16:51.960
Modified: 2026-04-13T19:16:51.960
Link: CVE-2026-40042
No data.
OpenCVE Enrichment
Updated: 2026-04-14T16:33:38Z