๐Ÿ” CVE Alert

CVE-2026-40882

HIGH 7.6

OpenRemote has XXE in Velbus Asset Import

CVSS Score
7.6
EPSS Score
0.0%
EPSS Percentile
0th

OpenRemote is an open-source internet-of-things platform. Prior to version 1.22.0, the Velbus asset import path parses attacker-controlled XML without explicit XXE hardening. An authenticated user who can call the import endpoint may trigger XML external entity processing, which can lead to server-side file disclosure and SSRF. The target file must be less than 1023 characters. Version 1.22.0 fixes the issue.

CWE CWE-611
Vendor openremote
Product openremote
Published Apr 22, 2026
Stay Ahead of the Next One

Get instant alerts for openremote openremote

Be the first to know when new high vulnerabilities affecting openremote openremote are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
Low

Affected Versions

openremote / openremote
< 1.22.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openremote/openremote/security/advisories/GHSA-g24f-mgc3-jwwc