Users are recommended to upgrade to version 3.2.5 which fixes the issue, or mitigate the issue by disabling DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable.
This issue has been disclosed before as CVE-2018-1311, but unfortunately that advisory incorrectly stated the issue would be fixed in version 3.2.3 or 3.2.4.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 22 Jan 2026 14:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache xerces-c
|
|
| CPEs | cpe:2.3:a:apache:xerces-c:3.0.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache xerces-c
|
|
| Metrics |
cvssV3_1
|
ssvc
|
Fri, 17 Jan 2025 03:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache xerces-c\+\+ |
|
| CPEs | cpe:2.3:a:apache:xerces-c\+\+:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache xerces-c\+\+ |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-01-22T04:55:53.687Z
Reserved: 2024-01-22T16:40:42.873Z
Link: CVE-2024-23807
Updated: 2024-08-01T23:13:08.245Z
Status : Analyzed
Published: 2024-02-29T01:44:10.340
Modified: 2025-01-16T17:51:40.503
Link: CVE-2024-23807
OpenCVE Enrichment
No data.