CVE-2022-50899

Geonetwork 3.10 through 4.2.0 contains an XML external entity vulnerability in PDF rendering that allows attackers to retrieve arbitrary files from the server. Attackers can exploit the insecure XML parser by crafting a malicious XML document with external entity references to read system files through the baseURL parameter in PDF creation requests.
Configurations

Configuration 1 (hide)

cpe:2.3:a:osgeo:geonetwork:*:*:*:*:*:*:*:*

History

27 Feb 2026, 19:48

Type Values Removed Values Added
CPE cpe:2.3:a:osgeo:geonetwork:*:*:*:*:*:*:*:*
References () https://geonetwork-opensource.org/ - () https://geonetwork-opensource.org/ - Product
References () https://www.exploit-db.com/exploits/50982 - () https://www.exploit-db.com/exploits/50982 - Exploit, VDB Entry
References () https://www.vulncheck.com/advisories/geonetwork-xml-external-entity-xxe - () https://www.vulncheck.com/advisories/geonetwork-xml-external-entity-xxe - Third Party Advisory
First Time Osgeo geonetwork
Osgeo

13 Jan 2026, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-13 23:15

Updated : 2026-02-27 19:48


NVD link : CVE-2022-50899

Mitre link : CVE-2022-50899

CVE.ORG link : CVE-2022-50899


JSON object : View

Products Affected

osgeo

  • geonetwork
CWE
CWE-611

Improper Restriction of XML External Entity Reference