Description

Geonetwork 3.10 through 4.2.0 contains an XML external entity vulnerability in PDF rendering that allows attackers to retrieve arbitrary files from the server. Attackers can exploit the insecure XML parser by crafting a malicious XML document with external entity references to read system files through the baseURL parameter in PDF creation requests.

INFO

Published Date :

2026-01-13T22:51:45.416Z

Last Modified :

2026-04-07T14:06:34.276Z

Source :

VulnCheck
AFFECTED PRODUCTS

The following products are affected by CVE-2022-50899 vulnerability.

Vendors Products
Geonetwork
  • Opensource
Geonetwork-opensource
  • Geonetwork
Osgeo
  • Geonetwork
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2022-50899.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact