Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g24f-mgc3-jwwc | OpenRemote has XXE in Velbus Asset Import |
Fri, 24 Apr 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openremote:openremote:*:*:*:*:*:*:*:* |
Thu, 23 Apr 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openremote
Openremote openremote |
|
| Vendors & Products |
Openremote
Openremote openremote |
Wed, 22 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenRemote is an open-source internet-of-things platform. Prior to version 1.22.0, the Velbus asset import path parses attacker-controlled XML without explicit XXE hardening. An authenticated user who can call the import endpoint may trigger XML external entity processing, which can lead to server-side file disclosure and SSRF. The target file must be less than 1023 characters. Version 1.22.0 fixes the issue. | |
| Title | OpenRemote has XXE in Velbus Asset Import | |
| Weaknesses | CWE-611 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-23T13:47:07.964Z
Reserved: 2026-04-15T15:57:41.719Z
Link: CVE-2026-40882
Updated: 2026-04-23T13:47:04.000Z
Status : Analyzed
Published: 2026-04-22T21:17:08.733
Modified: 2026-04-24T13:24:32.900
Link: CVE-2026-40882
No data.
OpenCVE Enrichment
Updated: 2026-04-27T18:42:00Z
Github GHSA