First published: Fri Mar 28 2025(Updated: )
There is a XXE in W3CSS Validator versions before cssval-20250226 that allows an attacker to use specially-crafted XML objects to coerce server-side request forgery (SSRF). This could be exploited to read arbitrary local files if an attacker has access to exception messages.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
W3C CSS Validator | <cssval-20250226 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-1781 is considered to be high due to its potential for SSRF and unauthorized file access.
To fix CVE-2025-1781, upgrade the W3CSS Validator to version cssval-20250226 or later.
CVE-2025-1781 is associated with an XML External Entity (XXE) attack that can lead to server-side request forgery (SSRF).
Yes, CVE-2025-1781 can be exploited to read arbitrary local files if an attacker gains access to exception messages.
W3CSS Validator versions prior to cssval-20250226 are affected by CVE-2025-1781.