Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 14 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Pachno 1.0.6 contains an XML external entity injection vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting unsafe XML parsing in the TextParser helper. Attackers can inject malicious XML entities through wiki table syntax and inline tags in issue descriptions, comments, and wiki articles to trigger entity resolution via simplexml_load_string() without LIBXML_NONET restrictions. | |
| Title | Pachno 1.0.6 Wiki TextParser XML External Entity Injection | |
| First Time appeared |
Pachno
Pachno pachno |
|
| Weaknesses | CWE-403 | |
| CPEs | cpe:2.3:a:pachno:pachno:1.0.6:*:*:*:*:*:*:* | |
| Vendors & Products |
Pachno
Pachno pachno |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-12T01:46:29.284Z
Reserved: 2026-04-08T13:39:22.100Z
Link: CVE-2026-40042
Updated: 2026-04-14T15:27:04.843Z
Status : Deferred
Published: 2026-04-13T19:16:51.960
Modified: 2026-04-17T15:28:29.690
Link: CVE-2026-40042
No data.
OpenCVE Enrichment
Updated: 2026-04-14T16:33:38Z