OpenRemote is an open-source internet-of-things platform. Prior to version 1.22.0, the Velbus asset import path parses attacker-controlled XML without explicit XXE hardening. An authenticated user who can call the import endpoint may trigger XML external entity processing, which can lead to server-side file disclosure and SSRF. The target file must be less than 1023 characters. Version 1.22.0 fixes the issue.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g24f-mgc3-jwwc | OpenRemote has XXE in Velbus Asset Import |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 22 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openremote
Openremote openremote |
|
| Vendors & Products |
Openremote
Openremote openremote |
Wed, 22 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenRemote is an open-source internet-of-things platform. Prior to version 1.22.0, the Velbus asset import path parses attacker-controlled XML without explicit XXE hardening. An authenticated user who can call the import endpoint may trigger XML external entity processing, which can lead to server-side file disclosure and SSRF. The target file must be less than 1023 characters. Version 1.22.0 fixes the issue. | |
| Title | OpenRemote has XXE in Velbus Asset Import | |
| Weaknesses | CWE-611 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-22T20:33:23.304Z
Reserved: 2026-04-15T15:57:41.719Z
Link: CVE-2026-40882
No data.
Status : Awaiting Analysis
Published: 2026-04-22T21:17:08.733
Modified: 2026-04-22T21:23:52.620
Link: CVE-2026-40882
No data.
OpenCVE Enrichment
Updated: 2026-04-22T21:30:27Z
Weaknesses
Github GHSA