{"api_version":"1","generated_at":"2026-04-23T06:21:35+00:00","cve":"CVE-2021-27777","urls":{"html":"https://cve.report/CVE-2021-27777","api":"https://cve.report/api/cve/CVE-2021-27777.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-27777","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-27777"},"summary":{"title":"CVE-2021-27777","description":"XML External Entity (XXE) injection vulnerabilities occur when poorly configured XML parsers process user supplied input without sufficient validation. Attackers can exploit this vulnerability to manipulate XML content and inject malicious external entity references.","state":"PUBLIC","assigner":"psirt@hcl.com","published_at":"2022-05-12 22:15:00","updated_at":"2022-08-06 03:18:00"},"problem_types":["CWE-611"],"metrics":[],"references":[{"url":"https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097124","name":"https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097124","refsource":"MISC","tags":[],"title":"Security Bulletin: Unica Platform is vulnerable to XML External Entity Injection - Customer Support","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-27777","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27777","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"27777","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hcltech","cpe5":"unica","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"psirt@hcl.com","DATE_PUBLIC":"2022-04-10T00:00:00.000Z","ID":"CVE-2021-27777","STATE":"PUBLIC","TITLE":"HCL Unica Platform is vulnerable to XML External Entity (XXE) injection"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"HCL Unica","version":{"version_data":[{"version_value":"12 and below"}]}}]},"vendor_name":"HCL Software"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"XML External Entity (XXE) injection vulnerabilities occur when poorly configured XML parsers process user supplied input without sufficient validation. Attackers can exploit this vulnerability to manipulate XML content and inject malicious external entity references."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-91 XML Injection (aka Blind XPath Injection)"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097124","name":"https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097124"}]},"source":{"discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-05-12 22:15:00","lastModifiedDate":"2022-08-06 03:18:00","problem_types":["CWE-611"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hcltech:unica:*:*:*:*:*:*:*:*","versionEndExcluding":"12.1.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"27777","Ordinal":"202889","Title":"CVE-2021-27777","CVE":"CVE-2021-27777","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"27777","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}