[xsl] Saxon vulnerability

Subject: [xsl] Saxon vulnerability
From: "Michael Kay michaelkay90@xxxxxxxxx" <xsl-list-service@xxxxxxxxxxxxxxxxxxxxxx>
Date: Fri, 7 Mar 2025 20:09:18 -0000
If you are using Saxon to run untrusted XSLT or XQuery code, please note the
security vulnerability in parse-xml() identified by @Martin Honnen  at
https://saxonica.plan.io/issues/6711, and apply the workaround noted in
comment #12.

The effect of the vulnerability is to allow an attacker to execute a malicious
call on parse-xml() that reads filestore on the host machine. The normal JAXP
configuration settings to prevent such access have no effect on this path.

The problem affects all releases of SaxonJ and SaxonC, we have yet to assess
the situation with SaxonCS.

Michael Kay
Saxonica

Current Thread