Pachno 1.0.6 contains an XML external entity injection vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting unsafe XML parsing in the TextParser helper. Attackers can inject malicious XML entities through wiki table syntax and inline tags in issue descriptions, comments, and wiki articles to trigger entity resolution via simplexml_load_string() without LIBXML_NONET restrictions.
| Vendor | Product | Versions |
|---|---|---|
| pachno | pachno | 1.0.6 |
Updated severity to CRITICAL, added new description detailing the file descriptor leak, and noted that the exploit is not available.
Initial creation