A vulnerability was identified in O2OA up to 9.0.0. This impacts an unknown function of the file /x_program_center/jaxrs/mpweixin/check of the component HTTP POST Request Handler. The manipulation leads to xml external entity reference. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
PUBLISHED5.2CWE-611CWE-610
O2OA HTTP POST Request check xml external entity reference
Problem type
Affected products
O2OA
9.0 - AFFECTED
References
VDB-344640 | O2OA HTTP POST Request check xml external entity reference
https://vuldb.com/?id.344640
VDB-344640 | CTI Indicators (IOB, IOC, IOA)
https://vuldb.com/?ctiid.344640
Submit #745486 | 浙江兰德纵横网络技术股份有限公司 O2OA v6.1.0 至 v9.0.0 XML实体注入漏洞
https://vuldb.com/?submit.745486
Submit #745489 | O2OA开发平台 O2OA v6.1.0 至 v9.0.0 XML实体注入漏洞 (Duplicate)
https://vuldb.com/?submit.745489
github.com
https://github.com/SourByte05/SourByte-Lab/issues/7
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-2074Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-2074",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"dateUpdated": "2026-02-07T04:02:06.652Z",
"dateReserved": "2026-02-06T07:46:08.815Z",
"datePublished": "2026-02-07T04:02:06.652Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2026-02-07T04:02:06.652Z"
},
"title": "O2OA HTTP POST Request check xml external entity reference",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was identified in O2OA up to 9.0.0. This impacts an unknown function of the file /x_program_center/jaxrs/mpweixin/check of the component HTTP POST Request Handler. The manipulation leads to xml external entity reference. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"affected": [
{
"vendor": "n/a",
"product": "O2OA",
"modules": [
"HTTP POST Request Handler"
],
"versions": [
{
"version": "9.0",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "XML External Entity Reference",
"cweId": "CWE-611",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"lang": "en",
"description": "Externally Controlled Reference",
"cweId": "CWE-610",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?id.344640",
"name": "VDB-344640 | O2OA HTTP POST Request check xml external entity reference",
"tags": [
"vdb-entry"
]
},
{
"url": "https://vuldb.com/?ctiid.344640",
"name": "VDB-344640 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/?submit.745486",
"name": "Submit #745486 | 浙江兰德纵横网络技术股份有限公司 O2OA v6.1.0 至 v9.0.0 XML实体注入漏洞",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://vuldb.com/?submit.745489",
"name": "Submit #745489 | O2OA开发平台 O2OA v6.1.0 至 v9.0.0 XML实体注入漏洞 (Duplicate)",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://github.com/SourByte05/SourByte-Lab/issues/7",
"tags": [
"exploit",
"issue-tracking"
]
}
],
"metrics": [
{},
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV3_0": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV2_0": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"baseScore": 6.5
}
}
],
"timeline": [
{
"time": "2026-02-06T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2026-02-06T01:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2026-02-06T08:51:30.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "sourbyte (VulDB User)",
"type": "reporter"
}
]
}
}
}