CVE-2024-13971

Unauthenticated attackers can exploit a weakness in the XML parser functionality of Lobster_pro prior to version 4.12.6-GA. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.
References
Link Resource
https://www.schutzwerk.com/en/blog/schutzwerk-sa-2024-005/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:lobster-world:lobster_pro:*:*:*:*:*:*:*:*

History

06 May 2026, 20:19

Type Values Removed Values Added
CPE cpe:2.3:a:lobster-world:lobster_pro:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Lobster-world lobster Pro
Lobster-world
References () https://www.schutzwerk.com/en/blog/schutzwerk-sa-2024-005/ - () https://www.schutzwerk.com/en/blog/schutzwerk-sa-2024-005/ - Exploit, Third Party Advisory

30 Apr 2026, 15:48

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-30 13:16

Updated : 2026-05-06 20:19


NVD link : CVE-2024-13971

Mitre link : CVE-2024-13971

CVE.ORG link : CVE-2024-13971


JSON object : View

Products Affected

lobster-world

  • lobster_pro
CWE
CWE-611

Improper Restriction of XML External Entity Reference