We use cookies to improve your experience on our site.
AVID-2026-R0881
Description
Improper Restriction of XML External Entity Reference in stanfordnlp/corenlp (CVE-2021-3869)
Details
corenlp is vulnerable to Improper Restriction of XML External Entity Reference
Reason for inclusion in AVID: CVE-2021-3869 affects stanfordnlp/corenlp, a library used in AI/NLP pipelines. It is a known security vulnerability (XML External Entity Reference) in a software component commonly used to build AI systems, representing a software supply chain concern. The report includes CVE details, affected artifact, and references, enabling curation.
References
- NVD entry
- https://huntr.dev/bounties/2f8baf6c-14b3-420d-8ede-9805797cd324
- https://github.com/stanfordnlp/corenlp/commit/5d83f1e8482ca304db8be726cad89554c88f136a
Affected or Relevant Artifacts
- Developer: stanfordnlp
- Deployer: stanfordnlp
- Artifact Details:
| Type | Name |
|---|---|
| System | stanfordnlp/corenlp |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.0 |
| Vector String | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L |
| Base Score | 8.6 |
| Base Severity | 🔴 High |
| Attack Vector | NETWORK |
| Attack Complexity | 🟢 Low |
| Privileges Required | NONE |
| User Interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality Impact | 🔴 High |
| Integrity Impact | 🟢 Low |
| Availability Impact | 🟢 Low |
CWE
| ID | Description |
|---|---|
| CWE-611 | CWE-611 Improper Restriction of XML External Entity Reference |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2021-10-19
- Version: 0.3.3
- AVID Entry