CVE-2025-15251

A vulnerability was detected in beecue FastBee up to 2.1. Impacted is the function getRootElement of the file springboot/fastbee-server/sip-server/src/main/java/com/fastbee/sip/handler/req/ReqAbstractHandler.java of the component SIP Message Handler. The manipulation results in xml external entity reference. It is possible to launch the attack remotely. A high complexity level is associated with this attack. The exploitability is considered difficult. The project owner replied to the issue report: "Okay, we'll handle it as soon as possible."
Configurations

No configuration.

History

15 Apr 2026, 00:35

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad fue detectada en beecue FastBee hasta 2.1. Afectada es la función getRootElement del archivo springboot/fastbee-server/sip-server/src/main/java/com/fastbee/sip/handler/req/ReqAbstractHandler.java del componente SIP Message Handler. La manipulación resulta en referencia a entidad externa XML. Es posible lanzar el ataque de forma remota. Un alto nivel de complejidad está asociado con este ataque. La explotabilidad se considera difícil. El propietario del proyecto respondió al informe del problema: 'Okay, lo gestionaremos lo antes posible.'

30 Dec 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-30 14:15

Updated : 2026-04-15 00:35


NVD link : CVE-2025-15251

Mitre link : CVE-2025-15251

CVE.ORG link : CVE-2025-15251


JSON object : View

Products Affected

No product.

CWE
CWE-610

Externally Controlled Reference to a Resource in Another Sphere

CWE-611

Improper Restriction of XML External Entity Reference