{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T06:05:51.587","vulnerabilities":[{"cve":{"id":"CVE-2025-24911","sourceIdentifier":"security.vulnerabilities@hitachivantara.com","published":"2025-04-16T23:15:45.490","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Overview \n\n\n\n \n\n\n\nXML documents optionally contain a Document Type Definition (DTD), which, among other features, enables the definition of XML entities. It is possible to define an entity by providing a substitution string in the form of a URI. Once the content of the URI is read, it is fed back into the application that is processing the XML. This application may echo back the data (e.g. in an error message), thereby exposing the file contents. (CWE-611) \n\n\n\n \n\n\n\nDescription \n\n\n\n \n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.2, including 9.3.x and 8.3.x, do not correctly protect Data Access XMLParserFactoryProducer against out-of-band XML External Entity Reference. \n\n\n\n \n\n\n\nImpact \n\n\n\n \n\n\n\nBy submitting an XML file that defines an external entity with a file:// URI, an attacker can cause the processing application to read the contents of a local file. Using URIs with other schemes such as http://, the attacker can force the application to make outgoing requests to servers that the attacker cannot reach directly, which can be used to bypass firewall restrictions or hide the source of attacks such as port scanning."},{"lang":"es","value":"Descripción general: Los documentos XML contienen opcionalmente una definición de tipo de documento (DTD), que, entre otras características, permite la definición de entidades XML. Es posible definir una entidad proporcionando una cadena de sustitución en forma de URI. Una vez leído el contenido del URI, se devuelve a la aplicación que está procesando el XML. Esta aplicación puede devolver los datos (p. ej., en un mensaje de error), exponiendo así el contenido del archivo. (CWE-611) Descripción: Las versiones de Hitachi Vantara Pentaho Business Analytics Server anteriores a la 10.2.0.2, incluidas las 9.3.x y 8.3.x, no protegen correctamente el acceso a datos XMLParserFactoryProducer contra la referencia de entidad externa XML fuera de banda. Impacto Al enviar un archivo XML que define una entidad externa con un URI file://, un atacante puede provocar que la aplicación de procesamiento lea el contenido de un archivo local. Al utilizar URI con otros esquemas como http://, el atacante puede forzar a la aplicación a realizar solicitudes salientes a servidores a los que el atacante no puede acceder directamente, lo que puede usarse para eludir las restricciones del firewall u ocultar la fuente de ataques como el escaneo de puertos."}],"metrics":{"cvssMetricV31":[{"source":"security.vulnerabilities@hitachivantara.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","baseScore":4.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":3.6}]},"weaknesses":[{"source":"security.vulnerabilities@hitachivantara.com","type":"Secondary","description":[{"lang":"en","value":"CWE-611"}]}],"references":[{"url":"https://support.pentaho.com/hc/en-us/articles/35783689016589--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Restriction-of-XML-External-Entity-Reference-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24911","source":"security.vulnerabilities@hitachivantara.com"}]}}]}