{"api_version":"1","generated_at":"2026-04-18T04:15:08+00:00","cve":"CVE-2018-1000820","urls":{"html":"https://cve.report/CVE-2018-1000820","api":"https://cve.report/api/cve/CVE-2018-1000820.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-1000820","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000820"},"summary":{"title":"CVE-2018-1000820","description":"neo4j-contrib neo4j-apoc-procedures version before commit 45bc09c contains a XML External Entity (XXE) vulnerability in XML Parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This vulnerability appears to have been fixed in after commit 45bc09c.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2018-12-20 15:29:00","updated_at":"2023-01-23 15:40:00"},"problem_types":["CWE-611"],"metrics":[],"references":[{"url":"https://0dd.zone/2018/10/27/neo4f-apoc-procedures-XXE/","name":"https://0dd.zone/2018/10/27/neo4f-apoc-procedures-XXE/","refsource":"MISC","tags":["Third Party Advisory"],"title":"Neo4j Apoc Procedures XXE | 0dd - The Zero (0) Day Division","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://github.com/neo4j-contrib/neo4j-apoc-procedures/issues/931","name":"https://github.com/neo4j-contrib/neo4j-apoc-procedures/issues/931","refsource":"MISC","tags":["Issue Tracking","Patch","Third Party Advisory"],"title":"XXE in Xml.java · Issue #931 · neo4j-contrib/neo4j-apoc-procedures · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-1000820","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000820","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"1000820","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"neo4j","cpe5":"awesome_procedures_on_cyper","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"1000820","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"neo4j-contrib","cpe5":"neo4j-apoc-procedures","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"1000820","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"neo4j-contrib","cpe5":"neo4j-apoc-procedures","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2018-1000820","qid":"982319","title":"Java (maven) Security Update for org.neo4j.procedure:apoc (GHSA-r2pp-x4mm-4999)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","DATE_ASSIGNED":"2018-11-27T13:54:33.459191","DATE_REQUESTED":"2018-10-28T03:32:51","ID":"CVE-2018-1000820","REQUESTER":"sajeeb@0dd.zone","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"neo4j-contrib neo4j-apoc-procedures version before commit 45bc09c contains a XML External Entity (XXE) vulnerability in XML Parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This vulnerability appears to have been fixed in after commit 45bc09c."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://0dd.zone/2018/10/27/neo4f-apoc-procedures-XXE/","refsource":"MISC","url":"https://0dd.zone/2018/10/27/neo4f-apoc-procedures-XXE/"},{"name":"https://github.com/neo4j-contrib/neo4j-apoc-procedures/issues/931","refsource":"MISC","url":"https://github.com/neo4j-contrib/neo4j-apoc-procedures/issues/931"}]}},"nvd":{"publishedDate":"2018-12-20 15:29:00","lastModifiedDate":"2023-01-23 15:40:00","problem_types":["CWE-611"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":10,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:neo4j:awesome_procedures_on_cyper:*:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"1000820","Ordinal":"140607","Title":"CVE-2018-1000820","CVE":"CVE-2018-1000820","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"1000820","Ordinal":"1","NoteData":"neo4j-contrib neo4j-apoc-procedures version before commit 45bc09c contains a XML External Entity (XXE) vulnerability in XML Parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This vulnerability appears to have been fixed in after commit 45bc09c.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"1000820","Ordinal":"2","NoteData":"2018-12-20","Type":"Other","Title":"Published"}]}}}