๐Ÿ” CVE Alert

CVE-2026-2074

MEDIUM 6.3

O2OA HTTP POST Request check xml external entity reference

CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was identified in O2OA up to 9.0.0. This impacts an unknown function of the file /x_program_center/jaxrs/mpweixin/check of the component HTTP POST Request Handler. The manipulation leads to xml external entity reference. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

CWE CWE-611 CWE-610
Vendor n/a
Product o2oa
Published Feb 7, 2026
Last Updated Feb 23, 2026
Stay Ahead of the Next One

Get instant alerts for n/a o2oa

Be the first to know when new medium vulnerabilities affecting n/a o2oa are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

n/a / O2OA
9.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.344640 vuldb.com: https://vuldb.com/?ctiid.344640 vuldb.com: https://vuldb.com/?submit.745486 vuldb.com: https://vuldb.com/?submit.745489 github.com: https://github.com/SourByte05/SourByte-Lab/issues/7

Credits

๐Ÿ” sourbyte (VulDB User)